Advertisement
Guest User

Untitled

a guest
Feb 9th, 2016
98
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 147.95 KB | None | 0 0
  1. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Initializing cgroup subsys cpuset
  2. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Initializing cgroup subsys cpu
  3. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Initializing cgroup subsys cpuacct
  4. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Linux version 4.2.6-1-pve (root@elsa) (gcc version 4.9.2 (Debian 4.9.2-10) ) #1 SMP Thu Jan 21 09:34:06 CET 2016 ()
  5. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Command line: BOOT_IMAGE=/boot/vmlinuz-4.2.6-1-pve root=UUID=b3ecc6ba-76ec-4ac0-a2f3-5790352b664e ro
  6. Feb 8 08:11:19 networkhost kernel: [ 0.000000] KERNEL supported cpus:
  7. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Intel GenuineIntel
  8. Feb 8 08:11:19 networkhost kernel: [ 0.000000] AMD AuthenticAMD
  9. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Centaur CentaurHauls
  10. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/fpu: xstate_offset[2]: 0240, xstate_sizes[2]: 0100
  11. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
  12. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
  13. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
  14. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 0x340 bytes, using 'standard' format.
  15. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/fpu: Using 'eager' FPU context switches.
  16. Feb 8 08:11:19 networkhost kernel: [ 0.000000] e820: BIOS-provided physical RAM map:
  17. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009afff] usable
  18. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x000000000009b000-0x000000000009ffff] reserved
  19. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
  20. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x0000000079239fff] usable
  21. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x000000007923a000-0x000000007984ffff] reserved
  22. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x0000000079850000-0x000000007992afff] usable
  23. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x000000007992b000-0x0000000079e09fff] ACPI NVS
  24. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x0000000079e0a000-0x000000007bd51fff] reserved
  25. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x000000007bd52000-0x000000007bd52fff] usable
  26. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x000000007bd53000-0x000000007bdd8fff] reserved
  27. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x000000007bdd9000-0x000000007bffffff] usable
  28. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x0000000080000000-0x000000008fffffff] reserved
  29. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved
  30. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved
  31. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000107fffffff] usable
  32. Feb 8 08:11:19 networkhost kernel: [ 0.000000] NX (Execute Disable) protection: active
  33. Feb 8 08:11:19 networkhost kernel: [ 0.000000] SMBIOS 2.8 present.
  34. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMI: Supermicro Super Server/X10SRi-F, BIOS 1.0b 04/21/2015
  35. Feb 8 08:11:19 networkhost kernel: [ 0.000000] e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
  36. Feb 8 08:11:19 networkhost kernel: [ 0.000000] e820: remove [mem 0x000a0000-0x000fffff] usable
  37. Feb 8 08:11:19 networkhost kernel: [ 0.000000] e820: last_pfn = 0x1080000 max_arch_pfn = 0x400000000
  38. Feb 8 08:11:19 networkhost kernel: [ 0.000000] MTRR default type: write-back
  39. Feb 8 08:11:19 networkhost kernel: [ 0.000000] MTRR fixed ranges enabled:
  40. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 00000-9FFFF write-back
  41. Feb 8 08:11:19 networkhost kernel: [ 0.000000] A0000-BFFFF uncachable
  42. Feb 8 08:11:19 networkhost kernel: [ 0.000000] C0000-FFFFF write-protect
  43. Feb 8 08:11:19 networkhost kernel: [ 0.000000] MTRR variable ranges enabled:
  44. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 0 base 000080000000 mask 3FFF80000000 uncachable
  45. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 1 base 380000000000 mask 3FC000000000 uncachable
  46. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 2 base 0000FBE00000 mask 3FFFFFF00000 write-through
  47. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 3 disabled
  48. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 4 disabled
  49. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 5 disabled
  50. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 6 disabled
  51. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 7 disabled
  52. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 8 disabled
  53. Feb 8 08:11:19 networkhost kernel: [ 0.000000] 9 disabled
  54. Feb 8 08:11:19 networkhost kernel: [ 0.000000] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WC UC- WT
  55. Feb 8 08:11:19 networkhost kernel: [ 0.000000] e820: last_pfn = 0x7c000 max_arch_pfn = 0x400000000
  56. Feb 8 08:11:19 networkhost kernel: [ 0.000000] found SMP MP-table at [mem 0x000fd8f0-0x000fd8ff] mapped at [ffff8800000fd8f0]
  57. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Scanning 1 areas for low memory corruption
  58. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Base memory trampoline at [ffff880000095000] 95000 size 24576
  59. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Using GB pages for direct mapping
  60. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x00000000-0x000fffff]
  61. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x00000000-0x000fffff] page 4k
  62. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BRK [0x0220d000, 0x0220dfff] PGTABLE
  63. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BRK [0x0220e000, 0x0220efff] PGTABLE
  64. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BRK [0x0220f000, 0x0220ffff] PGTABLE
  65. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x107fe00000-0x107fffffff]
  66. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x107fe00000-0x107fffffff] page 1G
  67. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x1060000000-0x107fdfffff]
  68. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x1060000000-0x107fdfffff] page 1G
  69. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x00100000-0x79239fff]
  70. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x00100000-0x001fffff] page 4k
  71. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x00200000-0x791fffff] page 2M
  72. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x79200000-0x79239fff] page 4k
  73. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x79850000-0x7992afff]
  74. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x79850000-0x7992afff] page 4k
  75. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BRK [0x02210000, 0x02210fff] PGTABLE
  76. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x7bd52000-0x7bd52fff]
  77. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x7bd52000-0x7bd52fff] page 4k
  78. Feb 8 08:11:19 networkhost kernel: [ 0.000000] BRK [0x02211000, 0x02211fff] PGTABLE
  79. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x7bdd9000-0x7bffffff]
  80. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x7bdd9000-0x7bdfffff] page 4k
  81. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x7be00000-0x7bffffff] page 2M
  82. Feb 8 08:11:19 networkhost kernel: [ 0.000000] init_memory_mapping: [mem 0x100000000-0x105fffffff]
  83. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [mem 0x100000000-0x105fffffff] page 1G
  84. Feb 8 08:11:19 networkhost kernel: [ 0.000000] RAMDISK: [mem 0x34e06000-0x366fafff]
  85. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: Early table checksum verification disabled
  86. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: RSDP 0x00000000000F0530 000024 (v02 SUPERM)
  87. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: XSDT 0x00000000799770A0 0000C4 (v01 SUPERM SMCI--MB 01072009 AMI 00010013)
  88. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: FACP 0x00000000799A1AD8 00010C (v05 SUPERM SMCI--MB 01072009 AMI 00010013)
  89. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: DSDT 0x0000000079977200 02A8D8 (v02 SUPERM SMCI--MB 01072009 INTL 20091013)
  90. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: FACS 0x0000000079E07F80 000040
  91. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: APIC 0x00000000799A1BE8 000100 (v03 SUPERM SMCI--MB 01072009 AMI 00010013)
  92. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: FPDT 0x00000000799A1CE8 000044 (v01 SUPERM SMCI--MB 01072009 AMI 00010013)
  93. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: FIDT 0x00000000799A1D30 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013)
  94. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: SPMI 0x00000000799A1DD0 000040 (v05 A M I OEMSPMI 00000000 AMI. 00000000)
  95. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: MCFG 0x00000000799A1E10 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097)
  96. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: UEFI 0x00000000799A1E50 000042 (v01 SUPERM SMCI--MB 01072009 00000000)
  97. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: BDAT 0x00000000799A1E98 000030 (v01 SUPERM SMCI--MB 00000000 INTL 20091013)
  98. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: HPET 0x00000000799A1EC8 000038 (v01 SUPERM SMCI--MB 00000001 INTL 20091013)
  99. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: PMCT 0x00000000799A1F00 000064 (v01 SUPERM SMCI--MB 00000000 INTL 20091013)
  100. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: WDDT 0x00000000799A1F68 000040 (v01 SUPERM SMCI--MB 00000000 INTL 20091013)
  101. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: SSDT 0x00000000799A1FA8 00EDE7 (v01 SUPERM PmMgt 00000001 INTL 20120913)
  102. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: SSDT 0x00000000799B0D90 002117 (v02 SUPERM SpsNm 00000002 INTL 20120913)
  103. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: SSDT 0x00000000799B2EA8 000064 (v02 SUPERM SpsNvs 00000002 INTL 20120913)
  104. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: PRAD 0x00000000799B2F10 000102 (v02 SUPERM SMCI--MB 00000002 INTL 20120913)
  105. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: DMAR 0x00000000799B3018 0000CC (v01 SUPERM SMCI--MB 00000001 INTL 20091013)
  106. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: HEST 0x00000000799B30E8 00027C (v01 SUPERM SMCI--MB 00000001 INTL 00000001)
  107. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: BERT 0x00000000799B3368 000030 (v01 SUPERM SMCI--MB 00000001 INTL 00000001)
  108. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: ERST 0x00000000799B3398 000230 (v01 SUPERM SMCI--MB 00000001 INTL 00000001)
  109. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: EINJ 0x00000000799B35C8 000130 (v01 SUPERM SMCI--MB 00000001 INTL 00000001)
  110. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: Local APIC address 0xfee00000
  111. Feb 8 08:11:19 networkhost kernel: [ 0.000000] No NUMA configuration found
  112. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Faking a node at [mem 0x0000000000000000-0x000000107fffffff]
  113. Feb 8 08:11:19 networkhost kernel: [ 0.000000] NODE_DATA(0) allocated [mem 0x107fff9000-0x107fffdfff]
  114. Feb 8 08:11:19 networkhost kernel: [ 0.000000] [ffffea0000000000-ffffea0041ffffff] PMD -> [ffff88103f600000-ffff88107f5fffff] on node 0
  115. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Zone ranges:
  116. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA [mem 0x0000000000001000-0x0000000000ffffff]
  117. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA32 [mem 0x0000000001000000-0x00000000ffffffff]
  118. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Normal [mem 0x0000000100000000-0x000000107fffffff]
  119. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Movable zone start for each node
  120. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Early memory node ranges
  121. Feb 8 08:11:19 networkhost kernel: [ 0.000000] node 0: [mem 0x0000000000001000-0x000000000009afff]
  122. Feb 8 08:11:19 networkhost kernel: [ 0.000000] node 0: [mem 0x0000000000100000-0x0000000079239fff]
  123. Feb 8 08:11:19 networkhost kernel: [ 0.000000] node 0: [mem 0x0000000079850000-0x000000007992afff]
  124. Feb 8 08:11:19 networkhost kernel: [ 0.000000] node 0: [mem 0x000000007bd52000-0x000000007bd52fff]
  125. Feb 8 08:11:19 networkhost kernel: [ 0.000000] node 0: [mem 0x000000007bdd9000-0x000000007bffffff]
  126. Feb 8 08:11:19 networkhost kernel: [ 0.000000] node 0: [mem 0x0000000100000000-0x000000107fffffff]
  127. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Initmem setup node 0 [mem 0x0000000000001000-0x000000107fffffff]
  128. Feb 8 08:11:19 networkhost kernel: [ 0.000000] On node 0 totalpages: 16749783
  129. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA zone: 64 pages used for memmap
  130. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA zone: 21 pages reserved
  131. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA zone: 3994 pages, LIFO batch:0
  132. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA32 zone: 7701 pages used for memmap
  133. Feb 8 08:11:19 networkhost kernel: [ 0.000000] DMA32 zone: 492861 pages, LIFO batch:31
  134. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Normal zone: 253952 pages used for memmap
  135. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Normal zone: 16252928 pages, LIFO batch:31
  136. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: PM-Timer IO Port: 0x408
  137. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: Local APIC address 0xfee00000
  138. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1])
  139. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1])
  140. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1])
  141. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1])
  142. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1])
  143. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1])
  144. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1])
  145. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1])
  146. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1])
  147. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1])
  148. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1])
  149. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1])
  150. Feb 8 08:11:19 networkhost kernel: [ 0.000000] IOAPIC[0]: apic_id 8, version 32, address 0xfec00000, GSI 0-23
  151. Feb 8 08:11:19 networkhost kernel: [ 0.000000] IOAPIC[1]: apic_id 9, version 32, address 0xfec01000, GSI 24-47
  152. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
  153. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
  154. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: IRQ0 used by override.
  155. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: IRQ9 used by override.
  156. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Using ACPI (MADT) for SMP configuration information
  157. Feb 8 08:11:19 networkhost kernel: [ 0.000000] ACPI: HPET id: 0x8086a701 base: 0xfed00000
  158. Feb 8 08:11:19 networkhost kernel: [ 0.000000] smpboot: Allowing 12 CPUs, 0 hotplug CPUs
  159. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
  160. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x0009b000-0x0009ffff]
  161. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x000a0000-0x000dffff]
  162. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x000e0000-0x000fffff]
  163. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x7923a000-0x7984ffff]
  164. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x7992b000-0x79e09fff]
  165. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x79e0a000-0x7bd51fff]
  166. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x7bd53000-0x7bdd8fff]
  167. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x7c000000-0x7fffffff]
  168. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x80000000-0x8fffffff]
  169. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0x90000000-0xfed1bfff]
  170. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0xfed1c000-0xfed1ffff]
  171. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0xfed20000-0xfeffffff]
  172. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PM: Registered nosave memory: [mem 0xff000000-0xffffffff]
  173. Feb 8 08:11:19 networkhost kernel: [ 0.000000] e820: [mem 0x90000000-0xfed1bfff] available for PCI devices
  174. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Booting paravirtualized kernel on bare hardware
  175. Feb 8 08:11:19 networkhost kernel: [ 0.000000] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns
  176. Feb 8 08:11:19 networkhost kernel: [ 0.000000] setup_percpu: NR_CPUS:256 nr_cpumask_bits:256 nr_cpu_ids:12 nr_node_ids:1
  177. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PERCPU: Embedded 33 pages/cpu @ffff88103f200000 s97688 r8192 d29288 u262144
  178. Feb 8 08:11:19 networkhost kernel: [ 0.000000] pcpu-alloc: s97688 r8192 d29288 u262144 alloc=1*2097152
  179. Feb 8 08:11:19 networkhost kernel: [ 0.000000] pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 -- -- -- --
  180. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Built 1 zonelists in Node order, mobility grouping on. Total pages: 16488045
  181. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Policy zone: Normal
  182. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.2.6-1-pve root=UUID=b3ecc6ba-76ec-4ac0-a2f3-5790352b664e ro
  183. Feb 8 08:11:19 networkhost kernel: [ 0.000000] PID hash table entries: 4096 (order: 3, 32768 bytes)
  184. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Calgary: detecting Calgary via BIOS EBDA area
  185. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Calgary: Unable to locate Rio Grande table in EBDA - bailing!
  186. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Memory: 65838468K/66999132K available (8244K kernel code, 1326K rwdata, 3808K rodata, 1480K init, 1300K bss, 1160664K reserved, 0K cma-reserved)
  187. Feb 8 08:11:19 networkhost kernel: [ 0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=12, Nodes=1
  188. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Hierarchical RCU implementation.
  189. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Build-time adjustment of leaf fanout to 64.
  190. Feb 8 08:11:19 networkhost kernel: [ 0.000000] RCU restricting CPUs from NR_CPUS=256 to nr_cpu_ids=12.
  191. Feb 8 08:11:19 networkhost kernel: [ 0.000000] RCU: Adjusting geometry for rcu_fanout_leaf=64, nr_cpu_ids=12
  192. Feb 8 08:11:19 networkhost kernel: [ 0.000000] NR_IRQS:16640 nr_irqs:928 16
  193. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Offload RCU callbacks from all CPUs
  194. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Offload RCU callbacks from CPUs: 0-11.
  195. Feb 8 08:11:19 networkhost kernel: [ 0.000000] Console: colour VGA+ 80x25
  196. Feb 8 08:11:19 networkhost kernel: [ 0.000000] console [tty0] enabled
  197. Feb 8 08:11:19 networkhost kernel: [ 0.000000] clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns
  198. Feb 8 08:11:19 networkhost kernel: [ 0.000000] hpet clockevent registered
  199. Feb 8 08:11:19 networkhost kernel: [ 0.000000] tsc: Fast TSC calibration using PIT
  200. Feb 8 08:11:19 networkhost kernel: [ 0.000000] tsc: Detected 3499.772 MHz processor
  201. Feb 8 08:11:19 networkhost kernel: [ 0.000021] Calibrating delay loop (skipped), value calculated using timer frequency.. 6999.54 BogoMIPS (lpj=13999088)
  202. Feb 8 08:11:19 networkhost kernel: [ 0.000165] pid_max: default: 32768 minimum: 301
  203. Feb 8 08:11:19 networkhost kernel: [ 0.000238] ACPI: Core revision 20150619
  204. Feb 8 08:11:19 networkhost kernel: [ 0.026421] ACPI: All ACPI Tables successfully acquired
  205. Feb 8 08:11:19 networkhost kernel: [ 0.026591] Security Framework initialized
  206. Feb 8 08:11:19 networkhost kernel: [ 0.026668] AppArmor: AppArmor initialized
  207. Feb 8 08:11:19 networkhost kernel: [ 0.026737] Yama: becoming mindful.
  208. Feb 8 08:11:19 networkhost kernel: [ 0.029348] Dentry cache hash table entries: 8388608 (order: 14, 67108864 bytes)
  209. Feb 8 08:11:19 networkhost kernel: [ 0.037543] Inode-cache hash table entries: 4194304 (order: 13, 33554432 bytes)
  210. Feb 8 08:11:19 networkhost kernel: [ 0.041096] Mount-cache hash table entries: 131072 (order: 8, 1048576 bytes)
  211. Feb 8 08:11:19 networkhost kernel: [ 0.041217] Mountpoint-cache hash table entries: 131072 (order: 8, 1048576 bytes)
  212. Feb 8 08:11:19 networkhost kernel: [ 0.041640] Initializing cgroup subsys blkio
  213. Feb 8 08:11:19 networkhost kernel: [ 0.041711] Initializing cgroup subsys memory
  214. Feb 8 08:11:19 networkhost kernel: [ 0.041785] Initializing cgroup subsys devices
  215. Feb 8 08:11:19 networkhost kernel: [ 0.041856] Initializing cgroup subsys freezer
  216. Feb 8 08:11:19 networkhost kernel: [ 0.041926] Initializing cgroup subsys net_cls
  217. Feb 8 08:11:19 networkhost kernel: [ 0.041996] Initializing cgroup subsys perf_event
  218. Feb 8 08:11:19 networkhost kernel: [ 0.042079] Initializing cgroup subsys net_prio
  219. Feb 8 08:11:19 networkhost kernel: [ 0.042150] Initializing cgroup subsys hugetlb
  220. Feb 8 08:11:19 networkhost kernel: [ 0.042238] CPU: Physical Processor ID: 0
  221. Feb 8 08:11:19 networkhost kernel: [ 0.046232] CPU: Processor Core ID: 0
  222. Feb 8 08:11:19 networkhost kernel: [ 0.047124] mce: CPU supports 22 MCE banks
  223. Feb 8 08:11:19 networkhost kernel: [ 0.047224] CPU0: Thermal monitoring enabled (TM1)
  224. Feb 8 08:11:19 networkhost kernel: [ 0.047317] process: using mwait in idle threads
  225. Feb 8 08:11:19 networkhost kernel: [ 0.047389] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024
  226. Feb 8 08:11:19 networkhost kernel: [ 0.047462] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4
  227. Feb 8 08:11:19 networkhost kernel: [ 0.047795] Freeing SMP alternatives memory: 28K (ffffffff820bf000 - ffffffff820c6000)
  228. Feb 8 08:11:19 networkhost kernel: [ 0.049193] ftrace: allocating 31332 entries in 123 pages
  229. Feb 8 08:11:19 networkhost kernel: [ 0.058527] DMAR: Host address width 46
  230. Feb 8 08:11:19 networkhost kernel: [ 0.058597] DMAR: DRHD base: 0x000000fbffc000 flags: 0x1
  231. Feb 8 08:11:19 networkhost kernel: [ 0.058672] DMAR: dmar0: reg_base_addr fbffc000 ver 1:0 cap d2078c106f0466 ecap f020de
  232. Feb 8 08:11:19 networkhost kernel: [ 0.058767] DMAR: RMRR base: 0x0000007bacc000 end: 0x0000007badafff
  233. Feb 8 08:11:19 networkhost kernel: [ 0.058841] DMAR: ATSR flags: 0x0
  234. Feb 8 08:11:19 networkhost kernel: [ 0.058908] DMAR: RHSA base: 0x000000fbffc000 proximity domain: 0x0
  235. Feb 8 08:11:19 networkhost kernel: [ 0.058983] DMAR-IR: IOAPIC id 8 under DRHD base 0xfbffc000 IOMMU 0
  236. Feb 8 08:11:19 networkhost kernel: [ 0.059056] DMAR-IR: IOAPIC id 9 under DRHD base 0xfbffc000 IOMMU 0
  237. Feb 8 08:11:19 networkhost kernel: [ 0.059130] DMAR-IR: HPET id 0 under DRHD base 0xfbffc000
  238. Feb 8 08:11:19 networkhost kernel: [ 0.059202] DMAR-IR: x2apic is disabled because BIOS sets x2apic opt out bit.
  239. Feb 8 08:11:19 networkhost kernel: [ 0.059259] DMAR-IR: Use 'intremap=no_x2apic_optout' to override the BIOS setting.
  240. Feb 8 08:11:19 networkhost kernel: [ 0.059634] DMAR-IR: Enabled IRQ remapping in xapic mode
  241. Feb 8 08:11:19 networkhost kernel: [ 0.059706] x2apic: IRQ remapping doesn't support X2APIC mode
  242. Feb 8 08:11:19 networkhost kernel: [ 0.059781] Switched APIC routing to physical flat.
  243. Feb 8 08:11:19 networkhost kernel: [ 0.060342] ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
  244. Feb 8 08:11:19 networkhost kernel: [ 0.100157] TSC deadline timer enabled
  245. Feb 8 08:11:19 networkhost kernel: [ 0.100159] smpboot: CPU0: Intel(R) Xeon(R) CPU E5-1650 v3 @ 3.50GHz (fam: 06, model: 3f, stepping: 02)
  246. Feb 8 08:11:19 networkhost kernel: [ 0.100399] Performance Events: PEBS fmt2+, 16-deep LBR, Haswell events, full-width counters, Intel PMU driver.
  247. Feb 8 08:11:19 networkhost kernel: [ 0.100721] ... version: 3
  248. Feb 8 08:11:19 networkhost kernel: [ 0.100790] ... bit width: 48
  249. Feb 8 08:11:19 networkhost kernel: [ 0.100858] ... generic registers: 4
  250. Feb 8 08:11:19 networkhost kernel: [ 0.100927] ... value mask: 0000ffffffffffff
  251. Feb 8 08:11:19 networkhost kernel: [ 0.100998] ... max period: 0000ffffffffffff
  252. Feb 8 08:11:19 networkhost kernel: [ 0.101069] ... fixed-purpose events: 3
  253. Feb 8 08:11:19 networkhost kernel: [ 0.101138] ... event mask: 000000070000000f
  254. Feb 8 08:11:19 networkhost kernel: [ 0.101757] x86: Booting SMP configuration:
  255. Feb 8 08:11:19 networkhost kernel: [ 0.101826] .... node #0, CPUs: #1
  256. Feb 8 08:11:19 networkhost kernel: [ 0.106137] NMI watchdog: enabled on all CPUs, permanently consumes one hw-PMU counter.
  257. Feb 8 08:11:19 networkhost kernel: [ 0.106361] #2 #3 #4 #5 #6 #7 #8 #9 #10 #11
  258. Feb 8 08:11:19 networkhost kernel: [ 0.147694] x86: Booted up 1 node, 12 CPUs
  259. Feb 8 08:11:19 networkhost kernel: [ 0.147826] smpboot: Total of 12 processors activated (83994.52 BogoMIPS)
  260. Feb 8 08:11:19 networkhost kernel: [ 0.162861] devtmpfs: initialized
  261. Feb 8 08:11:19 networkhost kernel: [ 0.162976] memory block size : 2048MB
  262. Feb 8 08:11:19 networkhost kernel: [ 0.164057] evm: security.selinux
  263. Feb 8 08:11:19 networkhost kernel: [ 0.164124] evm: security.SMACK64
  264. Feb 8 08:11:19 networkhost kernel: [ 0.164191] evm: security.SMACK64EXEC
  265. Feb 8 08:11:19 networkhost kernel: [ 0.164259] evm: security.SMACK64TRANSMUTE
  266. Feb 8 08:11:19 networkhost kernel: [ 0.164328] evm: security.SMACK64MMAP
  267. Feb 8 08:11:19 networkhost kernel: [ 0.164395] evm: security.ima
  268. Feb 8 08:11:19 networkhost kernel: [ 0.164462] evm: security.capability
  269. Feb 8 08:11:19 networkhost kernel: [ 0.164564] PM: Registering ACPI NVS region [mem 0x7992b000-0x79e09fff] (5107712 bytes)
  270. Feb 8 08:11:19 networkhost kernel: [ 0.164767] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
  271. Feb 8 08:11:19 networkhost kernel: [ 0.164942] pinctrl core: initialized pinctrl subsystem
  272. Feb 8 08:11:19 networkhost kernel: [ 0.165095] RTC time: 13:11:02, date: 02/08/16
  273. Feb 8 08:11:19 networkhost kernel: [ 0.165782] NET: Registered protocol family 16
  274. Feb 8 08:11:19 networkhost kernel: [ 0.170696] cpuidle: using governor ladder
  275. Feb 8 08:11:19 networkhost kernel: [ 0.174703] cpuidle: using governor menu
  276. Feb 8 08:11:19 networkhost kernel: [ 0.174868] ACPI FADT declares the system doesn't support PCIe ASPM, so disable it
  277. Feb 8 08:11:19 networkhost kernel: [ 0.174963] ACPI: bus type PCI registered
  278. Feb 8 08:11:19 networkhost kernel: [ 0.175032] acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
  279. Feb 8 08:11:19 networkhost kernel: [ 0.175152] PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0x80000000-0x8fffffff] (base 0x80000000)
  280. Feb 8 08:11:19 networkhost kernel: [ 0.175251] PCI: MMCONFIG at [mem 0x80000000-0x8fffffff] reserved in E820
  281. Feb 8 08:11:19 networkhost kernel: [ 0.175351] PCI: Using configuration type 1 for base access
  282. Feb 8 08:11:19 networkhost kernel: [ 0.175664] perf_event_intel: PMU erratum BJ122, BV98, HSD29 worked around, HT is on
  283. Feb 8 08:11:19 networkhost kernel: [ 0.179064] ACPI: Added _OSI(Module Device)
  284. Feb 8 08:11:19 networkhost kernel: [ 0.179134] ACPI: Added _OSI(Processor Device)
  285. Feb 8 08:11:19 networkhost kernel: [ 0.179204] ACPI: Added _OSI(3.0 _SCP Extensions)
  286. Feb 8 08:11:19 networkhost kernel: [ 0.179274] ACPI: Added _OSI(Processor Aggregator Device)
  287. Feb 8 08:11:19 networkhost kernel: [ 0.191775] [Firmware Bug]: ACPI: BIOS _OSI(Linux) query ignored
  288. Feb 8 08:11:19 networkhost kernel: [ 0.238919] ACPI: Dynamic OEM Table Load:
  289. Feb 8 08:11:19 networkhost kernel: [ 0.239074] ACPI: PRAD 0x0000000000000000 000102 (v02 SUPERM SMCI--MB 00000002 INTL 20120913)
  290. Feb 8 08:11:19 networkhost kernel: [ 0.240582] ACPI: Interpreter enabled
  291. Feb 8 08:11:19 networkhost kernel: [ 0.240654] ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S1_] (20150619/hwxface-580)
  292. Feb 8 08:11:19 networkhost kernel: [ 0.240837] ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S2_] (20150619/hwxface-580)
  293. Feb 8 08:11:19 networkhost kernel: [ 0.241020] ACPI Exception: AE_NOT_FOUND, While evaluating Sleep State [\_S3_] (20150619/hwxface-580)
  294. Feb 8 08:11:19 networkhost kernel: [ 0.241207] ACPI: (supports S0 S4 S5)
  295. Feb 8 08:11:19 networkhost kernel: [ 0.241275] ACPI: Using IOAPIC for interrupt routing
  296. Feb 8 08:11:19 networkhost kernel: [ 0.241363] HEST: Enabling Firmware First mode for corrected errors.
  297. Feb 8 08:11:19 networkhost kernel: [ 0.241524] HEST: Table parsing has been initialized.
  298. Feb 8 08:11:19 networkhost kernel: [ 0.241596] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
  299. Feb 8 08:11:19 networkhost kernel: [ 0.256983] ACPI: PCI Root Bridge [UNC0] (domain 0000 [bus ff])
  300. Feb 8 08:11:19 networkhost kernel: [ 0.257059] acpi PNP0A03:03: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI]
  301. Feb 8 08:11:19 networkhost kernel: [ 2.324657] acpi PNP0A03:03: _OSC: platform does not support [PCIeHotplug AER]
  302. Feb 8 08:11:19 networkhost kernel: [ 4.336531] acpi PNP0A03:03: _OSC: OS now controls [PME PCIeCapability]
  303. Feb 8 08:11:19 networkhost kernel: [ 4.336612] acpi PNP0A03:03: FADT indicates ASPM is unsupported, using BIOS configuration
  304. Feb 8 08:11:19 networkhost kernel: [ 4.336760] PCI host bridge to bus 0000:ff
  305. Feb 8 08:11:19 networkhost kernel: [ 4.336831] pci_bus 0000:ff: root bus resource [bus ff]
  306. Feb 8 08:11:19 networkhost kernel: [ 4.336911] pci 0000:ff:0b.0: [8086:2f81] type 00 class 0x088000
  307. Feb 8 08:11:19 networkhost kernel: [ 4.336952] pci 0000:ff:0b.1: [8086:2f36] type 00 class 0x110100
  308. Feb 8 08:11:19 networkhost kernel: [ 4.336984] pci 0000:ff:0b.2: [8086:2f37] type 00 class 0x110100
  309. Feb 8 08:11:19 networkhost kernel: [ 4.337017] pci 0000:ff:0c.0: [8086:2fe0] type 00 class 0x088000
  310. Feb 8 08:11:19 networkhost kernel: [ 4.337049] pci 0000:ff:0c.1: [8086:2fe1] type 00 class 0x088000
  311. Feb 8 08:11:19 networkhost kernel: [ 4.337079] pci 0000:ff:0c.2: [8086:2fe2] type 00 class 0x088000
  312. Feb 8 08:11:19 networkhost kernel: [ 4.337111] pci 0000:ff:0c.3: [8086:2fe3] type 00 class 0x088000
  313. Feb 8 08:11:19 networkhost kernel: [ 4.337140] pci 0000:ff:0c.4: [8086:2fe4] type 00 class 0x088000
  314. Feb 8 08:11:19 networkhost kernel: [ 4.337171] pci 0000:ff:0c.5: [8086:2fe5] type 00 class 0x088000
  315. Feb 8 08:11:19 networkhost kernel: [ 4.337202] pci 0000:ff:0f.0: [8086:2ff8] type 00 class 0x088000
  316. Feb 8 08:11:19 networkhost kernel: [ 4.337231] pci 0000:ff:0f.1: [8086:2ff9] type 00 class 0x088000
  317. Feb 8 08:11:19 networkhost kernel: [ 4.337263] pci 0000:ff:0f.4: [8086:2ffc] type 00 class 0x088000
  318. Feb 8 08:11:19 networkhost kernel: [ 4.337294] pci 0000:ff:0f.5: [8086:2ffd] type 00 class 0x088000
  319. Feb 8 08:11:19 networkhost kernel: [ 4.337325] pci 0000:ff:0f.6: [8086:2ffe] type 00 class 0x088000
  320. Feb 8 08:11:19 networkhost kernel: [ 4.337355] pci 0000:ff:10.0: [8086:2f1d] type 00 class 0x088000
  321. Feb 8 08:11:19 networkhost kernel: [ 4.337386] pci 0000:ff:10.1: [8086:2f34] type 00 class 0x110100
  322. Feb 8 08:11:19 networkhost kernel: [ 4.337417] pci 0000:ff:10.5: [8086:2f1e] type 00 class 0x088000
  323. Feb 8 08:11:19 networkhost kernel: [ 4.337447] pci 0000:ff:10.6: [8086:2f7d] type 00 class 0x110100
  324. Feb 8 08:11:19 networkhost kernel: [ 4.337476] pci 0000:ff:10.7: [8086:2f1f] type 00 class 0x088000
  325. Feb 8 08:11:19 networkhost kernel: [ 4.337506] pci 0000:ff:12.0: [8086:2fa0] type 00 class 0x088000
  326. Feb 8 08:11:19 networkhost kernel: [ 4.337541] pci 0000:ff:12.1: [8086:2f30] type 00 class 0x110100
  327. Feb 8 08:11:19 networkhost kernel: [ 4.337578] pci 0000:ff:13.0: [8086:2fa8] type 00 class 0x088000
  328. Feb 8 08:11:19 networkhost kernel: [ 4.337613] pci 0000:ff:13.1: [8086:2f71] type 00 class 0x088000
  329. Feb 8 08:11:19 networkhost kernel: [ 4.337647] pci 0000:ff:13.2: [8086:2faa] type 00 class 0x088000
  330. Feb 8 08:11:19 networkhost kernel: [ 4.337682] pci 0000:ff:13.3: [8086:2fab] type 00 class 0x088000
  331. Feb 8 08:11:19 networkhost kernel: [ 4.337716] pci 0000:ff:13.4: [8086:2fac] type 00 class 0x088000
  332. Feb 8 08:11:19 networkhost kernel: [ 4.337751] pci 0000:ff:13.5: [8086:2fad] type 00 class 0x088000
  333. Feb 8 08:11:19 networkhost kernel: [ 4.337787] pci 0000:ff:13.6: [8086:2fae] type 00 class 0x088000
  334. Feb 8 08:11:19 networkhost kernel: [ 4.337821] pci 0000:ff:13.7: [8086:2faf] type 00 class 0x088000
  335. Feb 8 08:11:19 networkhost kernel: [ 4.337854] pci 0000:ff:14.0: [8086:2fb0] type 00 class 0x088000
  336. Feb 8 08:11:19 networkhost kernel: [ 4.337889] pci 0000:ff:14.1: [8086:2fb1] type 00 class 0x088000
  337. Feb 8 08:11:19 networkhost kernel: [ 4.337924] pci 0000:ff:14.2: [8086:2fb2] type 00 class 0x088000
  338. Feb 8 08:11:19 networkhost kernel: [ 4.337959] pci 0000:ff:14.3: [8086:2fb3] type 00 class 0x088000
  339. Feb 8 08:11:19 networkhost kernel: [ 4.337994] pci 0000:ff:14.6: [8086:2fbe] type 00 class 0x088000
  340. Feb 8 08:11:19 networkhost kernel: [ 4.338027] pci 0000:ff:14.7: [8086:2fbf] type 00 class 0x088000
  341. Feb 8 08:11:19 networkhost kernel: [ 4.338060] pci 0000:ff:15.0: [8086:2fb4] type 00 class 0x088000
  342. Feb 8 08:11:19 networkhost kernel: [ 4.338097] pci 0000:ff:15.1: [8086:2fb5] type 00 class 0x088000
  343. Feb 8 08:11:19 networkhost kernel: [ 4.338132] pci 0000:ff:15.2: [8086:2fb6] type 00 class 0x088000
  344. Feb 8 08:11:19 networkhost kernel: [ 4.338167] pci 0000:ff:15.3: [8086:2fb7] type 00 class 0x088000
  345. Feb 8 08:11:19 networkhost kernel: [ 4.338204] pci 0000:ff:16.0: [8086:2f68] type 00 class 0x088000
  346. Feb 8 08:11:19 networkhost kernel: [ 4.338239] pci 0000:ff:16.6: [8086:2f6e] type 00 class 0x088000
  347. Feb 8 08:11:19 networkhost kernel: [ 4.338273] pci 0000:ff:16.7: [8086:2f6f] type 00 class 0x088000
  348. Feb 8 08:11:19 networkhost kernel: [ 4.338306] pci 0000:ff:17.0: [8086:2fd0] type 00 class 0x088000
  349. Feb 8 08:11:19 networkhost kernel: [ 4.338340] pci 0000:ff:17.4: [8086:2fb8] type 00 class 0x088000
  350. Feb 8 08:11:19 networkhost kernel: [ 4.338374] pci 0000:ff:17.5: [8086:2fb9] type 00 class 0x088000
  351. Feb 8 08:11:19 networkhost kernel: [ 4.338408] pci 0000:ff:17.6: [8086:2fba] type 00 class 0x088000
  352. Feb 8 08:11:19 networkhost kernel: [ 4.338442] pci 0000:ff:17.7: [8086:2fbb] type 00 class 0x088000
  353. Feb 8 08:11:19 networkhost kernel: [ 4.338478] pci 0000:ff:1e.0: [8086:2f98] type 00 class 0x088000
  354. Feb 8 08:11:19 networkhost kernel: [ 4.338511] pci 0000:ff:1e.1: [8086:2f99] type 00 class 0x088000
  355. Feb 8 08:11:19 networkhost kernel: [ 4.338543] pci 0000:ff:1e.2: [8086:2f9a] type 00 class 0x088000
  356. Feb 8 08:11:19 networkhost kernel: [ 4.338574] pci 0000:ff:1e.3: [8086:2fc0] type 00 class 0x088000
  357. Feb 8 08:11:19 networkhost kernel: [ 4.338578] pci 0000:ff:1e.3: [Firmware Bug]: reg 0x10: invalid BAR (can't size)
  358. Feb 8 08:11:19 networkhost kernel: [ 4.338702] pci 0000:ff:1e.4: [8086:2f9c] type 00 class 0x088000
  359. Feb 8 08:11:19 networkhost kernel: [ 4.338736] pci 0000:ff:1f.0: [8086:2f88] type 00 class 0x088000
  360. Feb 8 08:11:19 networkhost kernel: [ 4.338769] pci 0000:ff:1f.2: [8086:2f8a] type 00 class 0x088000
  361. Feb 8 08:11:19 networkhost kernel: [ 4.339502] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe])
  362. Feb 8 08:11:19 networkhost kernel: [ 4.339580] acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI]
  363. Feb 8 08:11:19 networkhost kernel: [ 4.339779] acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug AER]
  364. Feb 8 08:11:19 networkhost kernel: [ 4.339967] acpi PNP0A08:00: _OSC: OS now controls [PME PCIeCapability]
  365. Feb 8 08:11:19 networkhost kernel: [ 4.340042] acpi PNP0A08:00: FADT indicates ASPM is unsupported, using BIOS configuration
  366. Feb 8 08:11:19 networkhost kernel: [ 4.340494] PCI host bridge to bus 0000:00
  367. Feb 8 08:11:19 networkhost kernel: [ 4.340566] pci_bus 0000:00: root bus resource [bus 00-fe]
  368. Feb 8 08:11:19 networkhost kernel: [ 4.340640] pci_bus 0000:00: root bus resource [io 0x0000-0x03af window]
  369. Feb 8 08:11:19 networkhost kernel: [ 4.340716] pci_bus 0000:00: root bus resource [io 0x03e0-0x0cf7 window]
  370. Feb 8 08:11:19 networkhost kernel: [ 4.340792] pci_bus 0000:00: root bus resource [io 0x03b0-0x03df window]
  371. Feb 8 08:11:19 networkhost kernel: [ 4.340869] pci_bus 0000:00: root bus resource [io 0x1000-0xffff window]
  372. Feb 8 08:11:19 networkhost kernel: [ 4.340945] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
  373. Feb 8 08:11:19 networkhost kernel: [ 4.341042] pci_bus 0000:00: root bus resource [mem 0xfedb0000-0xfedb000f window]
  374. Feb 8 08:11:19 networkhost kernel: [ 4.341138] pci_bus 0000:00: root bus resource [mem 0xfedc0000-0xfedc000f window]
  375. Feb 8 08:11:19 networkhost kernel: [ 4.341234] pci_bus 0000:00: root bus resource [mem 0x90000000-0xfbffbfff window]
  376. Feb 8 08:11:19 networkhost kernel: [ 4.341334] pci 0000:00:00.0: [8086:2f00] type 00 class 0x060000
  377. Feb 8 08:11:19 networkhost kernel: [ 4.341424] pci 0000:00:01.0: [8086:2f02] type 01 class 0x060400
  378. Feb 8 08:11:19 networkhost kernel: [ 4.341460] pci 0000:00:01.0: PME# supported from D0 D3hot D3cold
  379. Feb 8 08:11:19 networkhost kernel: [ 4.341498] pci 0000:00:01.0: System wakeup disabled by ACPI
  380. Feb 8 08:11:19 networkhost kernel: [ 4.341594] pci 0000:00:02.0: [8086:2f04] type 01 class 0x060400
  381. Feb 8 08:11:19 networkhost kernel: [ 4.341628] pci 0000:00:02.0: PME# supported from D0 D3hot D3cold
  382. Feb 8 08:11:19 networkhost kernel: [ 4.341665] pci 0000:00:02.0: System wakeup disabled by ACPI
  383. Feb 8 08:11:19 networkhost kernel: [ 4.341760] pci 0000:00:03.0: [8086:2f08] type 01 class 0x060400
  384. Feb 8 08:11:19 networkhost kernel: [ 4.341796] pci 0000:00:03.0: PME# supported from D0 D3hot D3cold
  385. Feb 8 08:11:19 networkhost kernel: [ 4.341832] pci 0000:00:03.0: System wakeup disabled by ACPI
  386. Feb 8 08:11:19 networkhost kernel: [ 4.341927] pci 0000:00:03.2: [8086:2f0a] type 01 class 0x060400
  387. Feb 8 08:11:19 networkhost kernel: [ 4.341961] pci 0000:00:03.2: PME# supported from D0 D3hot D3cold
  388. Feb 8 08:11:19 networkhost kernel: [ 4.341998] pci 0000:00:03.2: System wakeup disabled by ACPI
  389. Feb 8 08:11:19 networkhost kernel: [ 4.342091] pci 0000:00:03.3: [8086:2f0b] type 01 class 0x060400
  390. Feb 8 08:11:19 networkhost kernel: [ 4.342126] pci 0000:00:03.3: PME# supported from D0 D3hot D3cold
  391. Feb 8 08:11:19 networkhost kernel: [ 4.342162] pci 0000:00:03.3: System wakeup disabled by ACPI
  392. Feb 8 08:11:19 networkhost kernel: [ 4.342258] pci 0000:00:04.0: [8086:2f20] type 00 class 0x088000
  393. Feb 8 08:11:19 networkhost kernel: [ 4.342271] pci 0000:00:04.0: reg 0x10: [mem 0xfb32c000-0xfb32ffff 64bit]
  394. Feb 8 08:11:19 networkhost kernel: [ 4.342346] pci 0000:00:04.1: [8086:2f21] type 00 class 0x088000
  395. Feb 8 08:11:19 networkhost kernel: [ 4.342358] pci 0000:00:04.1: reg 0x10: [mem 0xfb328000-0xfb32bfff 64bit]
  396. Feb 8 08:11:19 networkhost kernel: [ 4.342431] pci 0000:00:04.2: [8086:2f22] type 00 class 0x088000
  397. Feb 8 08:11:19 networkhost kernel: [ 4.342443] pci 0000:00:04.2: reg 0x10: [mem 0xfb324000-0xfb327fff 64bit]
  398. Feb 8 08:11:19 networkhost kernel: [ 4.342517] pci 0000:00:04.3: [8086:2f23] type 00 class 0x088000
  399. Feb 8 08:11:19 networkhost kernel: [ 4.342529] pci 0000:00:04.3: reg 0x10: [mem 0xfb320000-0xfb323fff 64bit]
  400. Feb 8 08:11:19 networkhost kernel: [ 4.342602] pci 0000:00:04.4: [8086:2f24] type 00 class 0x088000
  401. Feb 8 08:11:19 networkhost kernel: [ 4.342613] pci 0000:00:04.4: reg 0x10: [mem 0xfb31c000-0xfb31ffff 64bit]
  402. Feb 8 08:11:19 networkhost kernel: [ 4.342687] pci 0000:00:04.5: [8086:2f25] type 00 class 0x088000
  403. Feb 8 08:11:19 networkhost kernel: [ 4.342699] pci 0000:00:04.5: reg 0x10: [mem 0xfb318000-0xfb31bfff 64bit]
  404. Feb 8 08:11:19 networkhost kernel: [ 4.342772] pci 0000:00:04.6: [8086:2f26] type 00 class 0x088000
  405. Feb 8 08:11:19 networkhost kernel: [ 4.342784] pci 0000:00:04.6: reg 0x10: [mem 0xfb314000-0xfb317fff 64bit]
  406. Feb 8 08:11:19 networkhost kernel: [ 4.342857] pci 0000:00:04.7: [8086:2f27] type 00 class 0x088000
  407. Feb 8 08:11:19 networkhost kernel: [ 4.342869] pci 0000:00:04.7: reg 0x10: [mem 0xfb310000-0xfb313fff 64bit]
  408. Feb 8 08:11:19 networkhost kernel: [ 4.342943] pci 0000:00:05.0: [8086:2f28] type 00 class 0x088000
  409. Feb 8 08:11:19 networkhost kernel: [ 4.343015] pci 0000:00:05.1: [8086:2f29] type 00 class 0x088000
  410. Feb 8 08:11:19 networkhost kernel: [ 4.343096] pci 0000:00:05.2: [8086:2f2a] type 00 class 0x088000
  411. Feb 8 08:11:19 networkhost kernel: [ 4.343168] pci 0000:00:05.4: [8086:2f2c] type 00 class 0x080020
  412. Feb 8 08:11:19 networkhost kernel: [ 4.343178] pci 0000:00:05.4: reg 0x10: [mem 0xfb339000-0xfb339fff]
  413. Feb 8 08:11:19 networkhost kernel: [ 4.343261] pci 0000:00:11.0: [8086:8d7c] type 00 class 0xff0000
  414. Feb 8 08:11:19 networkhost kernel: [ 4.343401] pci 0000:00:11.4: [8086:8d62] type 00 class 0x010601
  415. Feb 8 08:11:19 networkhost kernel: [ 4.343422] pci 0000:00:11.4: reg 0x10: [io 0xf110-0xf117]
  416. Feb 8 08:11:19 networkhost kernel: [ 4.343429] pci 0000:00:11.4: reg 0x14: [io 0xf100-0xf103]
  417. Feb 8 08:11:19 networkhost kernel: [ 4.343436] pci 0000:00:11.4: reg 0x18: [io 0xf0f0-0xf0f7]
  418. Feb 8 08:11:19 networkhost kernel: [ 4.343443] pci 0000:00:11.4: reg 0x1c: [io 0xf0e0-0xf0e3]
  419. Feb 8 08:11:19 networkhost kernel: [ 4.343450] pci 0000:00:11.4: reg 0x20: [io 0xf020-0xf03f]
  420. Feb 8 08:11:19 networkhost kernel: [ 4.343457] pci 0000:00:11.4: reg 0x24: [mem 0xfb338000-0xfb3387ff]
  421. Feb 8 08:11:19 networkhost kernel: [ 4.343481] pci 0000:00:11.4: PME# supported from D3hot
  422. Feb 8 08:11:19 networkhost kernel: [ 4.343543] pci 0000:00:14.0: [8086:8d31] type 00 class 0x0c0330
  423. Feb 8 08:11:19 networkhost kernel: [ 4.343562] pci 0000:00:14.0: reg 0x10: [mem 0xfb300000-0xfb30ffff 64bit]
  424. Feb 8 08:11:19 networkhost kernel: [ 4.343601] pci 0000:00:14.0: PME# supported from D3hot D3cold
  425. Feb 8 08:11:19 networkhost kernel: [ 4.343646] pci 0000:00:14.0: System wakeup disabled by ACPI
  426. Feb 8 08:11:19 networkhost kernel: [ 4.343746] pci 0000:00:16.0: [8086:8d3a] type 00 class 0x078000
  427. Feb 8 08:11:19 networkhost kernel: [ 4.343769] pci 0000:00:16.0: reg 0x10: [mem 0xfb337000-0xfb33700f 64bit]
  428. Feb 8 08:11:19 networkhost kernel: [ 4.343812] pci 0000:00:16.0: PME# supported from D0 D3hot D3cold
  429. Feb 8 08:11:19 networkhost kernel: [ 4.343870] pci 0000:00:16.1: [8086:8d3b] type 00 class 0x078000
  430. Feb 8 08:11:19 networkhost kernel: [ 4.343893] pci 0000:00:16.1: reg 0x10: [mem 0xfb336000-0xfb33600f 64bit]
  431. Feb 8 08:11:19 networkhost kernel: [ 4.343935] pci 0000:00:16.1: PME# supported from D0 D3hot D3cold
  432. Feb 8 08:11:19 networkhost kernel: [ 4.344003] pci 0000:00:1a.0: [8086:8d2d] type 00 class 0x0c0320
  433. Feb 8 08:11:19 networkhost kernel: [ 4.344027] pci 0000:00:1a.0: reg 0x10: [mem 0xfb334000-0xfb3343ff]
  434. Feb 8 08:11:19 networkhost kernel: [ 4.344087] pci 0000:00:1a.0: PME# supported from D0 D3hot D3cold
  435. Feb 8 08:11:19 networkhost kernel: [ 4.344133] pci 0000:00:1a.0: System wakeup disabled by ACPI
  436. Feb 8 08:11:19 networkhost kernel: [ 4.344232] pci 0000:00:1c.0: [8086:8d10] type 01 class 0x060400
  437. Feb 8 08:11:19 networkhost kernel: [ 4.344284] pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold
  438. Feb 8 08:11:19 networkhost kernel: [ 4.344322] pci 0000:00:1c.0: System wakeup disabled by ACPI
  439. Feb 8 08:11:19 networkhost kernel: [ 4.344423] pci 0000:00:1c.6: [8086:8d1c] type 01 class 0x060400
  440. Feb 8 08:11:19 networkhost kernel: [ 4.344478] pci 0000:00:1c.6: PME# supported from D0 D3hot D3cold
  441. Feb 8 08:11:19 networkhost kernel: [ 4.344516] pci 0000:00:1c.6: System wakeup disabled by ACPI
  442. Feb 8 08:11:19 networkhost kernel: [ 4.344615] pci 0000:00:1d.0: [8086:8d26] type 00 class 0x0c0320
  443. Feb 8 08:11:19 networkhost kernel: [ 4.344640] pci 0000:00:1d.0: reg 0x10: [mem 0xfb333000-0xfb3333ff]
  444. Feb 8 08:11:19 networkhost kernel: [ 4.344699] pci 0000:00:1d.0: PME# supported from D0 D3hot D3cold
  445. Feb 8 08:11:19 networkhost kernel: [ 4.344745] pci 0000:00:1d.0: System wakeup disabled by ACPI
  446. Feb 8 08:11:19 networkhost kernel: [ 4.344845] pci 0000:00:1f.0: [8086:8d44] type 00 class 0x060100
  447. Feb 8 08:11:19 networkhost kernel: [ 4.344987] pci 0000:00:1f.2: [8086:8d02] type 00 class 0x010601
  448. Feb 8 08:11:19 networkhost kernel: [ 4.345005] pci 0000:00:1f.2: reg 0x10: [io 0xf070-0xf077]
  449. Feb 8 08:11:19 networkhost kernel: [ 4.345011] pci 0000:00:1f.2: reg 0x14: [io 0xf060-0xf063]
  450. Feb 8 08:11:19 networkhost kernel: [ 4.345017] pci 0000:00:1f.2: reg 0x18: [io 0xf050-0xf057]
  451. Feb 8 08:11:19 networkhost kernel: [ 4.345023] pci 0000:00:1f.2: reg 0x1c: [io 0xf040-0xf043]
  452. Feb 8 08:11:19 networkhost kernel: [ 4.345029] pci 0000:00:1f.2: reg 0x20: [io 0xf000-0xf01f]
  453. Feb 8 08:11:19 networkhost kernel: [ 4.345035] pci 0000:00:1f.2: reg 0x24: [mem 0xfb332000-0xfb3327ff]
  454. Feb 8 08:11:19 networkhost kernel: [ 4.345054] pci 0000:00:1f.2: PME# supported from D3hot
  455. Feb 8 08:11:19 networkhost kernel: [ 4.345109] pci 0000:00:1f.3: [8086:8d22] type 00 class 0x0c0500
  456. Feb 8 08:11:19 networkhost kernel: [ 4.345122] pci 0000:00:1f.3: reg 0x10: [mem 0xfb331000-0xfb3310ff 64bit]
  457. Feb 8 08:11:19 networkhost kernel: [ 4.345140] pci 0000:00:1f.3: reg 0x20: [io 0x0580-0x059f]
  458. Feb 8 08:11:19 networkhost kernel: [ 4.345208] pci 0000:00:1f.6: [8086:8d24] type 00 class 0x118000
  459. Feb 8 08:11:19 networkhost kernel: [ 4.345233] pci 0000:00:1f.6: reg 0x10: [mem 0xfb330000-0xfb330fff 64bit]
  460. Feb 8 08:11:19 networkhost kernel: [ 4.345429] pci 0000:00:01.0: PCI bridge to [bus 01]
  461. Feb 8 08:11:19 networkhost kernel: [ 4.345609] pci 0000:02:00.0: [1000:005b] type 00 class 0x010400
  462. Feb 8 08:11:19 networkhost kernel: [ 4.345624] pci 0000:02:00.0: reg 0x10: [io 0xe000-0xe0ff]
  463. Feb 8 08:11:19 networkhost kernel: [ 4.345630] pci 0000:02:00.0: reg 0x14: [mem 0xfb260000-0xfb263fff 64bit]
  464. Feb 8 08:11:19 networkhost kernel: [ 4.345636] pci 0000:02:00.0: reg 0x1c: [mem 0xfb200000-0xfb23ffff 64bit]
  465. Feb 8 08:11:19 networkhost kernel: [ 4.345644] pci 0000:02:00.0: reg 0x30: [mem 0xfb240000-0xfb25ffff pref]
  466. Feb 8 08:11:19 networkhost kernel: [ 4.345663] pci 0000:02:00.0: supports D1 D2
  467. Feb 8 08:11:19 networkhost kernel: [ 4.352511] pci 0000:00:02.0: PCI bridge to [bus 02]
  468. Feb 8 08:11:19 networkhost kernel: [ 4.352591] pci 0000:00:02.0: bridge window [io 0xe000-0xefff]
  469. Feb 8 08:11:19 networkhost kernel: [ 4.352595] pci 0000:00:02.0: bridge window [mem 0xfb200000-0xfb2fffff]
  470. Feb 8 08:11:19 networkhost kernel: [ 4.352850] pci 0000:00:03.0: PCI bridge to [bus 03]
  471. Feb 8 08:11:19 networkhost kernel: [ 4.353021] pci 0000:00:03.2: PCI bridge to [bus 04]
  472. Feb 8 08:11:19 networkhost kernel: [ 4.353211] pci 0000:05:00.0: [8086:1521] type 00 class 0x020000
  473. Feb 8 08:11:19 networkhost kernel: [ 4.353232] pci 0000:05:00.0: reg 0x10: [mem 0xfb120000-0xfb13ffff]
  474. Feb 8 08:11:19 networkhost kernel: [ 4.353243] pci 0000:05:00.0: reg 0x18: [io 0xd020-0xd03f]
  475. Feb 8 08:11:19 networkhost kernel: [ 4.353249] pci 0000:05:00.0: reg 0x1c: [mem 0xfb144000-0xfb147fff]
  476. Feb 8 08:11:19 networkhost kernel: [ 4.353298] pci 0000:05:00.0: PME# supported from D0 D3hot D3cold
  477. Feb 8 08:11:19 networkhost kernel: [ 4.353323] pci 0000:05:00.0: reg 0x184: [mem 0xfbe60000-0xfbe63fff 64bit pref]
  478. Feb 8 08:11:19 networkhost kernel: [ 4.353324] pci 0000:05:00.0: VF(n) BAR0 space: [mem 0xfbe60000-0xfbe7ffff 64bit pref] (contains BAR0 for 8 VFs)
  479. Feb 8 08:11:19 networkhost kernel: [ 4.353437] pci 0000:05:00.0: reg 0x190: [mem 0xfbe40000-0xfbe43fff 64bit pref]
  480. Feb 8 08:11:19 networkhost kernel: [ 4.353438] pci 0000:05:00.0: VF(n) BAR3 space: [mem 0xfbe40000-0xfbe5ffff 64bit pref] (contains BAR3 for 8 VFs)
  481. Feb 8 08:11:19 networkhost kernel: [ 4.353600] pci 0000:05:00.1: [8086:1521] type 00 class 0x020000
  482. Feb 8 08:11:19 networkhost kernel: [ 4.353620] pci 0000:05:00.1: reg 0x10: [mem 0xfb100000-0xfb11ffff]
  483. Feb 8 08:11:19 networkhost kernel: [ 4.353631] pci 0000:05:00.1: reg 0x18: [io 0xd000-0xd01f]
  484. Feb 8 08:11:19 networkhost kernel: [ 4.353637] pci 0000:05:00.1: reg 0x1c: [mem 0xfb140000-0xfb143fff]
  485. Feb 8 08:11:19 networkhost kernel: [ 4.353683] pci 0000:05:00.1: PME# supported from D0 D3hot D3cold
  486. Feb 8 08:11:19 networkhost kernel: [ 4.353705] pci 0000:05:00.1: reg 0x184: [mem 0xfbe20000-0xfbe23fff 64bit pref]
  487. Feb 8 08:11:19 networkhost kernel: [ 4.353706] pci 0000:05:00.1: VF(n) BAR0 space: [mem 0xfbe20000-0xfbe3ffff 64bit pref] (contains BAR0 for 8 VFs)
  488. Feb 8 08:11:19 networkhost kernel: [ 4.353819] pci 0000:05:00.1: reg 0x190: [mem 0xfbe00000-0xfbe03fff 64bit pref]
  489. Feb 8 08:11:19 networkhost kernel: [ 4.353820] pci 0000:05:00.1: VF(n) BAR3 space: [mem 0xfbe00000-0xfbe1ffff 64bit pref] (contains BAR3 for 8 VFs)
  490. Feb 8 08:11:19 networkhost kernel: [ 4.360537] pci 0000:00:03.3: PCI bridge to [bus 05-06]
  491. Feb 8 08:11:19 networkhost kernel: [ 4.360611] pci 0000:00:03.3: bridge window [io 0xd000-0xdfff]
  492. Feb 8 08:11:19 networkhost kernel: [ 4.360612] pci 0000:00:03.3: bridge window [mem 0xfb100000-0xfb1fffff]
  493. Feb 8 08:11:19 networkhost kernel: [ 4.360615] pci 0000:00:03.3: bridge window [mem 0xfbe00000-0xfbefffff 64bit pref]
  494. Feb 8 08:11:19 networkhost kernel: [ 4.360656] pci 0000:00:1c.0: PCI bridge to [bus 07]
  495. Feb 8 08:11:19 networkhost kernel: [ 4.360784] pci 0000:08:00.0: [1a03:1150] type 01 class 0x060400
  496. Feb 8 08:11:19 networkhost kernel: [ 4.360888] pci 0000:08:00.0: supports D1 D2
  497. Feb 8 08:11:19 networkhost kernel: [ 4.360889] pci 0000:08:00.0: PME# supported from D0 D1 D2 D3hot D3cold
  498. Feb 8 08:11:19 networkhost kernel: [ 4.368544] pci 0000:00:1c.6: PCI bridge to [bus 08-09]
  499. Feb 8 08:11:19 networkhost kernel: [ 4.368626] pci 0000:00:1c.6: bridge window [io 0xc000-0xcfff]
  500. Feb 8 08:11:19 networkhost kernel: [ 4.368631] pci 0000:00:1c.6: bridge window [mem 0xfa000000-0xfb0fffff]
  501. Feb 8 08:11:19 networkhost kernel: [ 4.368738] pci 0000:09:00.0: [1a03:2000] type 00 class 0x030000
  502. Feb 8 08:11:19 networkhost kernel: [ 4.368795] pci 0000:09:00.0: reg 0x10: [mem 0xfa000000-0xfaffffff]
  503. Feb 8 08:11:19 networkhost kernel: [ 4.368807] pci 0000:09:00.0: reg 0x14: [mem 0xfb000000-0xfb01ffff]
  504. Feb 8 08:11:19 networkhost kernel: [ 4.368820] pci 0000:09:00.0: reg 0x18: [io 0xc000-0xc07f]
  505. Feb 8 08:11:19 networkhost kernel: [ 4.368896] pci 0000:09:00.0: supports D1 D2
  506. Feb 8 08:11:19 networkhost kernel: [ 4.368897] pci 0000:09:00.0: PME# supported from D0 D1 D2 D3hot D3cold
  507. Feb 8 08:11:19 networkhost kernel: [ 4.368982] pci 0000:08:00.0: PCI bridge to [bus 09]
  508. Feb 8 08:11:19 networkhost kernel: [ 4.369062] pci 0000:08:00.0: bridge window [io 0xc000-0xcfff]
  509. Feb 8 08:11:19 networkhost kernel: [ 4.369066] pci 0000:08:00.0: bridge window [mem 0xfa000000-0xfb0fffff]
  510. Feb 8 08:11:19 networkhost kernel: [ 4.369111] pci_bus 0000:00: on NUMA node 0
  511. Feb 8 08:11:19 networkhost kernel: [ 4.369612] ACPI: PCI Interrupt Link [LNKA] (IRQs 3 4 5 6 7 10 *11 12 14 15)
  512. Feb 8 08:11:19 networkhost kernel: [ 4.370236] ACPI: PCI Interrupt Link [LNKB] (IRQs 3 4 5 6 7 *10 11 12 14 15)
  513. Feb 8 08:11:19 networkhost kernel: [ 4.370858] ACPI: PCI Interrupt Link [LNKC] (IRQs 3 4 *5 6 10 11 12 14 15)
  514. Feb 8 08:11:19 networkhost kernel: [ 4.371436] ACPI: PCI Interrupt Link [LNKD] (IRQs 3 4 5 6 10 *11 12 14 15)
  515. Feb 8 08:11:19 networkhost kernel: [ 4.372014] ACPI: PCI Interrupt Link [LNKE] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled.
  516. Feb 8 08:11:19 networkhost kernel: [ 4.372751] ACPI: PCI Interrupt Link [LNKF] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled.
  517. Feb 8 08:11:19 networkhost kernel: [ 4.373480] ACPI: PCI Interrupt Link [LNKG] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled.
  518. Feb 8 08:11:19 networkhost kernel: [ 4.374208] ACPI: PCI Interrupt Link [LNKH] (IRQs 3 4 5 6 7 10 11 12 14 15) *0, disabled.
  519. Feb 8 08:11:19 networkhost kernel: [ 4.374986] ACPI: Enabled 3 GPEs in block 00 to 3F
  520. Feb 8 08:11:19 networkhost kernel: [ 4.375286] vgaarb: setting as boot device: PCI:0000:09:00.0
  521. Feb 8 08:11:19 networkhost kernel: [ 4.375362] vgaarb: device added: PCI:0000:09:00.0,decodes=io+mem,owns=io+mem,locks=none
  522. Feb 8 08:11:19 networkhost kernel: [ 4.375460] vgaarb: loaded
  523. Feb 8 08:11:19 networkhost kernel: [ 4.375528] vgaarb: bridge control possible 0000:09:00.0
  524. Feb 8 08:11:19 networkhost kernel: [ 4.375745] SCSI subsystem initialized
  525. Feb 8 08:11:19 networkhost kernel: [ 4.375856] libata version 3.00 loaded.
  526. Feb 8 08:11:19 networkhost kernel: [ 4.375872] ACPI: bus type USB registered
  527. Feb 8 08:11:19 networkhost kernel: [ 4.375955] usbcore: registered new interface driver usbfs
  528. Feb 8 08:11:19 networkhost kernel: [ 4.376034] usbcore: registered new interface driver hub
  529. Feb 8 08:11:19 networkhost kernel: [ 4.376143] usbcore: registered new device driver usb
  530. Feb 8 08:11:19 networkhost kernel: [ 4.376356] PCI: Using ACPI for IRQ routing
  531. Feb 8 08:11:19 networkhost kernel: [ 4.381818] PCI: pci_cache_line_size set to 64 bytes
  532. Feb 8 08:11:19 networkhost kernel: [ 4.381918] e820: reserve RAM buffer [mem 0x0009b000-0x0009ffff]
  533. Feb 8 08:11:19 networkhost kernel: [ 4.381919] e820: reserve RAM buffer [mem 0x7923a000-0x7bffffff]
  534. Feb 8 08:11:19 networkhost kernel: [ 4.381920] e820: reserve RAM buffer [mem 0x7992b000-0x7bffffff]
  535. Feb 8 08:11:19 networkhost kernel: [ 4.381921] e820: reserve RAM buffer [mem 0x7bd53000-0x7bffffff]
  536. Feb 8 08:11:19 networkhost kernel: [ 4.382007] NetLabel: Initializing
  537. Feb 8 08:11:19 networkhost kernel: [ 4.382076] NetLabel: domain hash size = 128
  538. Feb 8 08:11:19 networkhost kernel: [ 4.382148] NetLabel: protocols = UNLABELED CIPSOv4
  539. Feb 8 08:11:19 networkhost kernel: [ 4.382246] NetLabel: unlabeled traffic allowed by default
  540. Feb 8 08:11:19 networkhost kernel: [ 4.386404] hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0
  541. Feb 8 08:11:19 networkhost kernel: [ 4.386866] hpet0: 8 comparators, 64-bit 14.318180 MHz counter
  542. Feb 8 08:11:19 networkhost kernel: [ 4.388981] clocksource: Switched to clocksource hpet
  543. Feb 8 08:11:19 networkhost kernel: [ 4.393618] AppArmor: AppArmor Filesystem Enabled
  544. Feb 8 08:11:19 networkhost kernel: [ 4.393732] pnp: PnP ACPI init
  545. Feb 8 08:11:19 networkhost kernel: [ 4.393924] pnp 00:00: Plug and Play ACPI device, IDs PNP0b00 (active)
  546. Feb 8 08:11:19 networkhost kernel: [ 4.393980] system 00:01: [io 0x0500-0x057f] has been reserved
  547. Feb 8 08:11:19 networkhost kernel: [ 4.394057] system 00:01: [io 0x0400-0x047f] could not be reserved
  548. Feb 8 08:11:19 networkhost kernel: [ 4.394133] system 00:01: [io 0x0580-0x059f] has been reserved
  549. Feb 8 08:11:19 networkhost kernel: [ 4.394208] system 00:01: [io 0x0600-0x061f] has been reserved
  550. Feb 8 08:11:19 networkhost kernel: [ 4.394282] system 00:01: [io 0x0880-0x0883] has been reserved
  551. Feb 8 08:11:19 networkhost kernel: [ 4.394357] system 00:01: [io 0x0800-0x081f] has been reserved
  552. Feb 8 08:11:19 networkhost kernel: [ 4.394433] system 00:01: [mem 0xfed1c000-0xfed3ffff] could not be reserved
  553. Feb 8 08:11:19 networkhost kernel: [ 4.394510] system 00:01: [mem 0xfed45000-0xfed8bfff] has been reserved
  554. Feb 8 08:11:19 networkhost kernel: [ 4.394587] system 00:01: [mem 0xff000000-0xffffffff] has been reserved
  555. Feb 8 08:11:19 networkhost kernel: [ 4.394663] system 00:01: [mem 0xfee00000-0xfeefffff] has been reserved
  556. Feb 8 08:11:19 networkhost kernel: [ 4.394739] system 00:01: [mem 0xfed12000-0xfed1200f] has been reserved
  557. Feb 8 08:11:19 networkhost kernel: [ 4.394816] system 00:01: [mem 0xfed12010-0xfed1201f] has been reserved
  558. Feb 8 08:11:19 networkhost kernel: [ 4.394892] system 00:01: [mem 0xfed1b000-0xfed1bfff] has been reserved
  559. Feb 8 08:11:19 networkhost kernel: [ 4.394969] system 00:01: Plug and Play ACPI device, IDs PNP0c02 (active)
  560. Feb 8 08:11:19 networkhost kernel: [ 4.395096] system 00:02: [io 0x0a00-0x0a0f] has been reserved
  561. Feb 8 08:11:19 networkhost kernel: [ 4.395172] system 00:02: [io 0x0a10-0x0a1f] has been reserved
  562. Feb 8 08:11:19 networkhost kernel: [ 4.395246] system 00:02: [io 0x0a20-0x0a2f] has been reserved
  563. Feb 8 08:11:19 networkhost kernel: [ 4.395321] system 00:02: [io 0x0a30-0x0a3f] has been reserved
  564. Feb 8 08:11:19 networkhost kernel: [ 4.395396] system 00:02: [io 0x0a40-0x0a4f] has been reserved
  565. Feb 8 08:11:19 networkhost kernel: [ 4.395472] system 00:02: Plug and Play ACPI device, IDs PNP0c02 (active)
  566. Feb 8 08:11:19 networkhost kernel: [ 4.395596] pnp 00:03: [dma 0 disabled]
  567. Feb 8 08:11:19 networkhost kernel: [ 4.395624] pnp 00:03: Plug and Play ACPI device, IDs PNP0501 (active)
  568. Feb 8 08:11:19 networkhost kernel: [ 4.395737] pnp 00:04: [dma 0 disabled]
  569. Feb 8 08:11:19 networkhost kernel: [ 4.395761] pnp 00:04: Plug and Play ACPI device, IDs PNP0501 (active)
  570. Feb 8 08:11:19 networkhost kernel: [ 4.395825] pnp 00:05: Plug and Play ACPI device, IDs IPI0001 (active)
  571. Feb 8 08:11:19 networkhost kernel: [ 4.396095] pnp: PnP ACPI: found 6 devices
  572. Feb 8 08:11:19 networkhost kernel: [ 4.402125] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
  573. Feb 8 08:11:19 networkhost kernel: [ 4.402243] pci 0000:00:01.0: bridge window [io 0x1000-0x0fff] to [bus 01] add_size 1000
  574. Feb 8 08:11:19 networkhost kernel: [ 4.402245] pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 01] add_size 200000 add_align 100000
  575. Feb 8 08:11:19 networkhost kernel: [ 4.402246] pci 0000:00:01.0: bridge window [mem 0x00100000-0x000fffff] to [bus 01] add_size 200000 add_align 100000
  576. Feb 8 08:11:19 networkhost kernel: [ 4.402263] pci 0000:00:1c.0: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000
  577. Feb 8 08:11:19 networkhost kernel: [ 4.402264] pci 0000:00:1c.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 07] add_size 200000 add_align 100000
  578. Feb 8 08:11:19 networkhost kernel: [ 4.402265] pci 0000:00:1c.0: bridge window [mem 0x00100000-0x000fffff] to [bus 07] add_size 200000 add_align 100000
  579. Feb 8 08:11:19 networkhost kernel: [ 4.402285] pci 0000:00:01.0: res[14]=[mem 0x00100000-0x000fffff] res_to_dev_res add_size 200000 min_align 100000
  580. Feb 8 08:11:19 networkhost kernel: [ 4.402286] pci 0000:00:01.0: res[14]=[mem 0x00100000-0x002fffff] res_to_dev_res add_size 200000 min_align 100000
  581. Feb 8 08:11:19 networkhost kernel: [ 4.402287] pci 0000:00:01.0: res[15]=[mem 0x00100000-0x000fffff 64bit pref] res_to_dev_res add_size 200000 min_align 100000
  582. Feb 8 08:11:19 networkhost kernel: [ 4.402288] pci 0000:00:01.0: res[15]=[mem 0x00100000-0x002fffff 64bit pref] res_to_dev_res add_size 200000 min_align 100000
  583. Feb 8 08:11:19 networkhost kernel: [ 4.402289] pci 0000:00:1c.0: res[14]=[mem 0x00100000-0x000fffff] res_to_dev_res add_size 200000 min_align 100000
  584. Feb 8 08:11:19 networkhost kernel: [ 4.402290] pci 0000:00:1c.0: res[14]=[mem 0x00100000-0x002fffff] res_to_dev_res add_size 200000 min_align 100000
  585. Feb 8 08:11:19 networkhost kernel: [ 4.402291] pci 0000:00:1c.0: res[15]=[mem 0x00100000-0x000fffff 64bit pref] res_to_dev_res add_size 200000 min_align 100000
  586. Feb 8 08:11:19 networkhost kernel: [ 4.402292] pci 0000:00:1c.0: res[15]=[mem 0x00100000-0x002fffff 64bit pref] res_to_dev_res add_size 200000 min_align 100000
  587. Feb 8 08:11:19 networkhost kernel: [ 4.402293] pci 0000:00:01.0: res[13]=[io 0x1000-0x0fff] res_to_dev_res add_size 1000 min_align 1000
  588. Feb 8 08:11:19 networkhost kernel: [ 4.402294] pci 0000:00:01.0: res[13]=[io 0x1000-0x1fff] res_to_dev_res add_size 1000 min_align 1000
  589. Feb 8 08:11:19 networkhost kernel: [ 4.402295] pci 0000:00:1c.0: res[13]=[io 0x1000-0x0fff] res_to_dev_res add_size 1000 min_align 1000
  590. Feb 8 08:11:19 networkhost kernel: [ 4.402296] pci 0000:00:1c.0: res[13]=[io 0x1000-0x1fff] res_to_dev_res add_size 1000 min_align 1000
  591. Feb 8 08:11:19 networkhost kernel: [ 4.402299] pci 0000:00:01.0: BAR 14: assigned [mem 0x90000000-0x901fffff]
  592. Feb 8 08:11:19 networkhost kernel: [ 4.402379] pci 0000:00:01.0: BAR 15: assigned [mem 0x90200000-0x903fffff 64bit pref]
  593. Feb 8 08:11:19 networkhost kernel: [ 4.402476] pci 0000:00:1c.0: BAR 14: assigned [mem 0x90400000-0x905fffff]
  594. Feb 8 08:11:19 networkhost kernel: [ 4.402554] pci 0000:00:1c.0: BAR 15: assigned [mem 0x90600000-0x907fffff 64bit pref]
  595. Feb 8 08:11:19 networkhost kernel: [ 4.402653] pci 0000:00:01.0: BAR 13: assigned [io 0x1000-0x1fff]
  596. Feb 8 08:11:19 networkhost kernel: [ 4.402729] pci 0000:00:1c.0: BAR 13: assigned [io 0x2000-0x2fff]
  597. Feb 8 08:11:19 networkhost kernel: [ 4.402805] pci 0000:00:01.0: PCI bridge to [bus 01]
  598. Feb 8 08:11:19 networkhost kernel: [ 4.402878] pci 0000:00:01.0: bridge window [io 0x1000-0x1fff]
  599. Feb 8 08:11:19 networkhost kernel: [ 4.402954] pci 0000:00:01.0: bridge window [mem 0x90000000-0x901fffff]
  600. Feb 8 08:11:19 networkhost kernel: [ 4.403032] pci 0000:00:01.0: bridge window [mem 0x90200000-0x903fffff 64bit pref]
  601. Feb 8 08:11:19 networkhost kernel: [ 4.403131] pci 0000:00:02.0: PCI bridge to [bus 02]
  602. Feb 8 08:11:19 networkhost kernel: [ 4.403203] pci 0000:00:02.0: bridge window [io 0xe000-0xefff]
  603. Feb 8 08:11:19 networkhost kernel: [ 4.403280] pci 0000:00:02.0: bridge window [mem 0xfb200000-0xfb2fffff]
  604. Feb 8 08:11:19 networkhost kernel: [ 4.403359] pci 0000:00:03.0: PCI bridge to [bus 03]
  605. Feb 8 08:11:19 networkhost kernel: [ 4.403435] pci 0000:00:03.2: PCI bridge to [bus 04]
  606. Feb 8 08:11:19 networkhost kernel: [ 4.403511] pci 0000:00:03.3: PCI bridge to [bus 05-06]
  607. Feb 8 08:11:19 networkhost kernel: [ 4.403585] pci 0000:00:03.3: bridge window [io 0xd000-0xdfff]
  608. Feb 8 08:11:19 networkhost kernel: [ 4.403661] pci 0000:00:03.3: bridge window [mem 0xfb100000-0xfb1fffff]
  609. Feb 8 08:11:19 networkhost kernel: [ 4.403738] pci 0000:00:03.3: bridge window [mem 0xfbe00000-0xfbefffff 64bit pref]
  610. Feb 8 08:11:19 networkhost kernel: [ 4.403837] pci 0000:00:1c.0: PCI bridge to [bus 07]
  611. Feb 8 08:11:19 networkhost kernel: [ 4.403910] pci 0000:00:1c.0: bridge window [io 0x2000-0x2fff]
  612. Feb 8 08:11:19 networkhost kernel: [ 4.403987] pci 0000:00:1c.0: bridge window [mem 0x90400000-0x905fffff]
  613. Feb 8 08:11:19 networkhost kernel: [ 4.404065] pci 0000:00:1c.0: bridge window [mem 0x90600000-0x907fffff 64bit pref]
  614. Feb 8 08:11:19 networkhost kernel: [ 4.404166] pci 0000:08:00.0: PCI bridge to [bus 09]
  615. Feb 8 08:11:19 networkhost kernel: [ 4.404240] pci 0000:08:00.0: bridge window [io 0xc000-0xcfff]
  616. Feb 8 08:11:19 networkhost kernel: [ 4.404319] pci 0000:08:00.0: bridge window [mem 0xfa000000-0xfb0fffff]
  617. Feb 8 08:11:19 networkhost kernel: [ 4.404405] pci 0000:00:1c.6: PCI bridge to [bus 08-09]
  618. Feb 8 08:11:19 networkhost kernel: [ 4.404478] pci 0000:00:1c.6: bridge window [io 0xc000-0xcfff]
  619. Feb 8 08:11:19 networkhost kernel: [ 4.404557] pci 0000:00:1c.6: bridge window [mem 0xfa000000-0xfb0fffff]
  620. Feb 8 08:11:19 networkhost kernel: [ 4.404639] pci_bus 0000:00: resource 4 [io 0x0000-0x03af window]
  621. Feb 8 08:11:19 networkhost kernel: [ 4.404640] pci_bus 0000:00: resource 5 [io 0x03e0-0x0cf7 window]
  622. Feb 8 08:11:19 networkhost kernel: [ 4.404641] pci_bus 0000:00: resource 6 [io 0x03b0-0x03df window]
  623. Feb 8 08:11:19 networkhost kernel: [ 4.404642] pci_bus 0000:00: resource 7 [io 0x1000-0xffff window]
  624. Feb 8 08:11:19 networkhost kernel: [ 4.404643] pci_bus 0000:00: resource 8 [mem 0x000a0000-0x000bffff window]
  625. Feb 8 08:11:19 networkhost kernel: [ 4.404644] pci_bus 0000:00: resource 9 [mem 0xfedb0000-0xfedb000f window]
  626. Feb 8 08:11:19 networkhost kernel: [ 4.404645] pci_bus 0000:00: resource 10 [mem 0xfedc0000-0xfedc000f window]
  627. Feb 8 08:11:19 networkhost kernel: [ 4.404646] pci_bus 0000:00: resource 11 [mem 0x90000000-0xfbffbfff window]
  628. Feb 8 08:11:19 networkhost kernel: [ 4.404647] pci_bus 0000:01: resource 0 [io 0x1000-0x1fff]
  629. Feb 8 08:11:19 networkhost kernel: [ 4.404648] pci_bus 0000:01: resource 1 [mem 0x90000000-0x901fffff]
  630. Feb 8 08:11:19 networkhost kernel: [ 4.404649] pci_bus 0000:01: resource 2 [mem 0x90200000-0x903fffff 64bit pref]
  631. Feb 8 08:11:19 networkhost kernel: [ 4.404650] pci_bus 0000:02: resource 0 [io 0xe000-0xefff]
  632. Feb 8 08:11:19 networkhost kernel: [ 4.404651] pci_bus 0000:02: resource 1 [mem 0xfb200000-0xfb2fffff]
  633. Feb 8 08:11:19 networkhost kernel: [ 4.404652] pci_bus 0000:05: resource 0 [io 0xd000-0xdfff]
  634. Feb 8 08:11:19 networkhost kernel: [ 4.404652] pci_bus 0000:05: resource 1 [mem 0xfb100000-0xfb1fffff]
  635. Feb 8 08:11:19 networkhost kernel: [ 4.404653] pci_bus 0000:05: resource 2 [mem 0xfbe00000-0xfbefffff 64bit pref]
  636. Feb 8 08:11:19 networkhost kernel: [ 4.404654] pci_bus 0000:07: resource 0 [io 0x2000-0x2fff]
  637. Feb 8 08:11:19 networkhost kernel: [ 4.404655] pci_bus 0000:07: resource 1 [mem 0x90400000-0x905fffff]
  638. Feb 8 08:11:19 networkhost kernel: [ 4.404656] pci_bus 0000:07: resource 2 [mem 0x90600000-0x907fffff 64bit pref]
  639. Feb 8 08:11:19 networkhost kernel: [ 4.404657] pci_bus 0000:08: resource 0 [io 0xc000-0xcfff]
  640. Feb 8 08:11:19 networkhost kernel: [ 4.404658] pci_bus 0000:08: resource 1 [mem 0xfa000000-0xfb0fffff]
  641. Feb 8 08:11:19 networkhost kernel: [ 4.404659] pci_bus 0000:09: resource 0 [io 0xc000-0xcfff]
  642. Feb 8 08:11:19 networkhost kernel: [ 4.404660] pci_bus 0000:09: resource 1 [mem 0xfa000000-0xfb0fffff]
  643. Feb 8 08:11:19 networkhost kernel: [ 4.404684] NET: Registered protocol family 2
  644. Feb 8 08:11:19 networkhost kernel: [ 4.405020] TCP established hash table entries: 524288 (order: 10, 4194304 bytes)
  645. Feb 8 08:11:19 networkhost kernel: [ 4.405637] TCP bind hash table entries: 65536 (order: 8, 1048576 bytes)
  646. Feb 8 08:11:19 networkhost kernel: [ 4.405835] TCP: Hash tables configured (established 524288 bind 65536)
  647. Feb 8 08:11:19 networkhost kernel: [ 4.405971] UDP hash table entries: 32768 (order: 8, 1048576 bytes)
  648. Feb 8 08:11:19 networkhost kernel: [ 4.406202] UDP-Lite hash table entries: 32768 (order: 8, 1048576 bytes)
  649. Feb 8 08:11:19 networkhost kernel: [ 4.406441] NET: Registered protocol family 1
  650. Feb 8 08:11:19 networkhost kernel: [ 4.437190] PCI: CLS mismatch (64 != 32), using 64 bytes
  651. Feb 8 08:11:19 networkhost kernel: [ 4.437205] pci 0000:09:00.0: Video device with shadowed ROM
  652. Feb 8 08:11:19 networkhost kernel: [ 4.437284] Trying to unpack rootfs image as initramfs...
  653. Feb 8 08:11:19 networkhost kernel: [ 4.702441] Freeing initrd memory: 25556K (ffff880034e06000 - ffff8800366fb000)
  654. Feb 8 08:11:19 networkhost kernel: [ 4.702633] PCI-DMA: Using software bounce buffering for IO (SWIOTLB)
  655. Feb 8 08:11:19 networkhost kernel: [ 4.702709] software IO TLB [mem 0x7523a000-0x7923a000] (64MB) mapped at [ffff88007523a000-ffff880079239fff]
  656. Feb 8 08:11:19 networkhost kernel: [ 4.702862] RAPL PMU detected, API unit is 2^-32 Joules, 3 fixed counters 655360 ms ovfl timer
  657. Feb 8 08:11:19 networkhost kernel: [ 4.702961] hw unit of domain pp0-core 2^-14 Joules
  658. Feb 8 08:11:19 networkhost kernel: [ 4.703032] hw unit of domain package 2^-14 Joules
  659. Feb 8 08:11:19 networkhost kernel: [ 4.703103] hw unit of domain dram 2^-16 Joules
  660. Feb 8 08:11:19 networkhost kernel: [ 4.703177] Intel CQM monitoring enabled
  661. Feb 8 08:11:19 networkhost kernel: [ 4.703469] microcode: CPU0 sig=0x306f2, pf=0x1, revision=0x2e
  662. Feb 8 08:11:19 networkhost kernel: [ 4.703547] microcode: CPU1 sig=0x306f2, pf=0x1, revision=0x2e
  663. Feb 8 08:11:19 networkhost kernel: [ 4.703626] microcode: CPU2 sig=0x306f2, pf=0x1, revision=0x2e
  664. Feb 8 08:11:19 networkhost kernel: [ 4.703706] microcode: CPU3 sig=0x306f2, pf=0x1, revision=0x2e
  665. Feb 8 08:11:19 networkhost kernel: [ 4.703785] microcode: CPU4 sig=0x306f2, pf=0x1, revision=0x2e
  666. Feb 8 08:11:19 networkhost kernel: [ 4.703864] microcode: CPU5 sig=0x306f2, pf=0x1, revision=0x2e
  667. Feb 8 08:11:19 networkhost kernel: [ 4.703943] microcode: CPU6 sig=0x306f2, pf=0x1, revision=0x2e
  668. Feb 8 08:11:19 networkhost kernel: [ 4.704023] microcode: CPU7 sig=0x306f2, pf=0x1, revision=0x2e
  669. Feb 8 08:11:19 networkhost kernel: [ 4.704101] microcode: CPU8 sig=0x306f2, pf=0x1, revision=0x2e
  670. Feb 8 08:11:19 networkhost kernel: [ 4.704179] microcode: CPU9 sig=0x306f2, pf=0x1, revision=0x2e
  671. Feb 8 08:11:19 networkhost kernel: [ 4.704257] microcode: CPU10 sig=0x306f2, pf=0x1, revision=0x2e
  672. Feb 8 08:11:19 networkhost kernel: [ 4.704335] microcode: CPU11 sig=0x306f2, pf=0x1, revision=0x2e
  673. Feb 8 08:11:19 networkhost kernel: [ 4.704448] microcode: Microcode Update Driver: v2.00 <tigran@aivazian.fsnet.co.uk>, Peter Oruba
  674. Feb 8 08:11:19 networkhost kernel: [ 4.704604] Scanning for low memory corruption every 60 seconds
  675. Feb 8 08:11:19 networkhost kernel: [ 4.704950] futex hash table entries: 4096 (order: 6, 262144 bytes)
  676. Feb 8 08:11:19 networkhost kernel: [ 4.705058] Initialise system trusted keyring
  677. Feb 8 08:11:19 networkhost kernel: [ 4.705145] audit: initializing netlink subsys (disabled)
  678. Feb 8 08:11:19 networkhost kernel: [ 4.705228] audit: type=2000 audit(1454937066.572:1): initialized
  679. Feb 8 08:11:19 networkhost kernel: [ 4.705728] HugeTLB registered 1 GB page size, pre-allocated 0 pages
  680. Feb 8 08:11:19 networkhost kernel: [ 4.705803] HugeTLB registered 2 MB page size, pre-allocated 0 pages
  681. Feb 8 08:11:19 networkhost kernel: [ 4.706737] zpool: loaded
  682. Feb 8 08:11:19 networkhost kernel: [ 4.706804] zbud: loaded
  683. Feb 8 08:11:19 networkhost kernel: [ 4.706983] VFS: Disk quotas dquot_6.6.0
  684. Feb 8 08:11:19 networkhost kernel: [ 4.707075] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
  685. Feb 8 08:11:19 networkhost kernel: [ 4.707444] fuse init (API version 7.23)
  686. Feb 8 08:11:19 networkhost kernel: [ 4.707605] Key type big_key registered
  687. Feb 8 08:11:19 networkhost kernel: [ 4.707937] Key type asymmetric registered
  688. Feb 8 08:11:19 networkhost kernel: [ 4.708008] Asymmetric key parser 'x509' registered
  689. Feb 8 08:11:19 networkhost kernel: [ 4.708088] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
  690. Feb 8 08:11:19 networkhost kernel: [ 4.708230] io scheduler noop registered
  691. Feb 8 08:11:19 networkhost kernel: [ 4.708301] io scheduler deadline registered (default)
  692. Feb 8 08:11:19 networkhost kernel: [ 4.708391] io scheduler cfq registered
  693. Feb 8 08:11:19 networkhost kernel: [ 4.709147] pcieport 0000:00:01.0: Signaling PME through PCIe PME interrupt
  694. Feb 8 08:11:19 networkhost kernel: [ 4.709225] pcie_pme 0000:00:01.0:pcie01: service driver pcie_pme loaded
  695. Feb 8 08:11:19 networkhost kernel: [ 4.709236] pcieport 0000:00:02.0: Signaling PME through PCIe PME interrupt
  696. Feb 8 08:11:19 networkhost kernel: [ 4.709313] pci 0000:02:00.0: Signaling PME through PCIe PME interrupt
  697. Feb 8 08:11:19 networkhost kernel: [ 4.709389] pcie_pme 0000:00:02.0:pcie01: service driver pcie_pme loaded
  698. Feb 8 08:11:19 networkhost kernel: [ 4.709399] pcieport 0000:00:03.0: Signaling PME through PCIe PME interrupt
  699. Feb 8 08:11:19 networkhost kernel: [ 4.709483] pcie_pme 0000:00:03.0:pcie01: service driver pcie_pme loaded
  700. Feb 8 08:11:19 networkhost kernel: [ 4.709494] pcieport 0000:00:03.2: Signaling PME through PCIe PME interrupt
  701. Feb 8 08:11:19 networkhost kernel: [ 4.709572] pcie_pme 0000:00:03.2:pcie01: service driver pcie_pme loaded
  702. Feb 8 08:11:19 networkhost kernel: [ 4.709581] pcieport 0000:00:03.3: Signaling PME through PCIe PME interrupt
  703. Feb 8 08:11:19 networkhost kernel: [ 4.709657] pci 0000:05:00.0: Signaling PME through PCIe PME interrupt
  704. Feb 8 08:11:19 networkhost kernel: [ 4.709733] pci 0000:05:00.1: Signaling PME through PCIe PME interrupt
  705. Feb 8 08:11:19 networkhost kernel: [ 4.709809] pcie_pme 0000:00:03.3:pcie01: service driver pcie_pme loaded
  706. Feb 8 08:11:19 networkhost kernel: [ 4.709821] pcieport 0000:00:1c.0: Signaling PME through PCIe PME interrupt
  707. Feb 8 08:11:19 networkhost kernel: [ 4.709899] pcie_pme 0000:00:1c.0:pcie01: service driver pcie_pme loaded
  708. Feb 8 08:11:19 networkhost kernel: [ 4.709911] pcieport 0000:00:1c.6: Signaling PME through PCIe PME interrupt
  709. Feb 8 08:11:19 networkhost kernel: [ 4.709988] pci 0000:08:00.0: Signaling PME through PCIe PME interrupt
  710. Feb 8 08:11:19 networkhost kernel: [ 4.710063] pci 0000:09:00.0: Signaling PME through PCIe PME interrupt
  711. Feb 8 08:11:19 networkhost kernel: [ 4.710140] pcie_pme 0000:00:1c.6:pcie01: service driver pcie_pme loaded
  712. Feb 8 08:11:19 networkhost kernel: [ 4.710145] pci_hotplug: PCI Hot Plug PCI Core version: 0.5
  713. Feb 8 08:11:19 networkhost kernel: [ 4.710222] pciehp: PCI Express Hot Plug Controller Driver version: 0.4
  714. Feb 8 08:11:19 networkhost kernel: [ 4.710328] intel_idle: MWAIT substates: 0x2120
  715. Feb 8 08:11:19 networkhost kernel: [ 4.710329] intel_idle: v0.4 model 0x3F
  716. Feb 8 08:11:19 networkhost kernel: [ 4.710330] intel_idle: lapic_timer_reliable_states 0xffffffff
  717. Feb 8 08:11:19 networkhost kernel: [ 4.710677] input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0
  718. Feb 8 08:11:19 networkhost kernel: [ 4.710777] ACPI: Power Button [PWRB]
  719. Feb 8 08:11:19 networkhost kernel: [ 4.710867] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input1
  720. Feb 8 08:11:19 networkhost kernel: [ 4.710963] ACPI: Power Button [PWRF]
  721. Feb 8 08:11:19 networkhost kernel: [ 4.712348] ERST: Error Record Serialization Table (ERST) support is initialized.
  722. Feb 8 08:11:19 networkhost kernel: [ 4.712446] pstore: Registered erst as persistent store backend
  723. Feb 8 08:11:19 networkhost kernel: [ 4.712658] GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC.
  724. Feb 8 08:11:19 networkhost kernel: [ 4.712830] Serial: 8250/16550 driver, 32 ports, IRQ sharing enabled
  725. Feb 8 08:11:19 networkhost kernel: [ 4.733366] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
  726. Feb 8 08:11:19 networkhost kernel: [ 4.753958] 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A
  727. Feb 8 08:11:19 networkhost kernel: [ 4.755063] Linux agpgart interface v0.103
  728. Feb 8 08:11:19 networkhost kernel: [ 4.756887] brd: module loaded
  729. Feb 8 08:11:19 networkhost kernel: [ 4.757682] loop: module loaded
  730. Feb 8 08:11:19 networkhost kernel: [ 4.757908] libphy: Fixed MDIO Bus: probed
  731. Feb 8 08:11:19 networkhost kernel: [ 4.757979] tun: Universal TUN/TAP device driver, 1.6
  732. Feb 8 08:11:19 networkhost kernel: [ 4.758051] tun: (C) 1999-2004 Max Krasnyansky <maxk@qualcomm.com>
  733. Feb 8 08:11:19 networkhost kernel: [ 4.758152] PPP generic driver version 2.4.2
  734. Feb 8 08:11:19 networkhost kernel: [ 4.758339] xhci_hcd 0000:00:14.0: xHCI Host Controller
  735. Feb 8 08:11:19 networkhost kernel: [ 4.758415] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1
  736. Feb 8 08:11:19 networkhost kernel: [ 4.759573] xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x100 quirks 0x00009810
  737. Feb 8 08:11:19 networkhost kernel: [ 4.759678] xhci_hcd 0000:00:14.0: cache line size of 64 is not supported
  738. Feb 8 08:11:19 networkhost kernel: [ 4.759720] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002
  739. Feb 8 08:11:19 networkhost kernel: [ 4.759796] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  740. Feb 8 08:11:19 networkhost kernel: [ 4.759892] usb usb1: Product: xHCI Host Controller
  741. Feb 8 08:11:19 networkhost kernel: [ 4.759963] usb usb1: Manufacturer: Linux 4.2.6-1-pve xhci-hcd
  742. Feb 8 08:11:19 networkhost kernel: [ 4.760037] usb usb1: SerialNumber: 0000:00:14.0
  743. Feb 8 08:11:19 networkhost kernel: [ 4.760179] hub 1-0:1.0: USB hub found
  744. Feb 8 08:11:19 networkhost kernel: [ 4.760263] hub 1-0:1.0: 15 ports detected
  745. Feb 8 08:11:19 networkhost kernel: [ 4.760895] xhci_hcd 0000:00:14.0: xHCI Host Controller
  746. Feb 8 08:11:19 networkhost kernel: [ 4.760969] xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2
  747. Feb 8 08:11:19 networkhost kernel: [ 4.761089] usb usb2: New USB device found, idVendor=1d6b, idProduct=0003
  748. Feb 8 08:11:19 networkhost kernel: [ 4.761165] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  749. Feb 8 08:11:19 networkhost kernel: [ 4.761260] usb usb2: Product: xHCI Host Controller
  750. Feb 8 08:11:19 networkhost kernel: [ 4.761331] usb usb2: Manufacturer: Linux 4.2.6-1-pve xhci-hcd
  751. Feb 8 08:11:19 networkhost kernel: [ 4.761406] usb usb2: SerialNumber: 0000:00:14.0
  752. Feb 8 08:11:19 networkhost kernel: [ 4.761544] hub 2-0:1.0: USB hub found
  753. Feb 8 08:11:19 networkhost kernel: [ 4.761623] hub 2-0:1.0: 6 ports detected
  754. Feb 8 08:11:19 networkhost kernel: [ 4.762006] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
  755. Feb 8 08:11:19 networkhost kernel: [ 4.762085] ehci-pci: EHCI PCI platform driver
  756. Feb 8 08:11:19 networkhost kernel: [ 4.762224] ehci-pci 0000:00:1a.0: EHCI Host Controller
  757. Feb 8 08:11:19 networkhost kernel: [ 4.762299] ehci-pci 0000:00:1a.0: new USB bus registered, assigned bus number 3
  758. Feb 8 08:11:19 networkhost kernel: [ 4.766381] ehci-pci 0000:00:1a.0: debug port 2
  759. Feb 8 08:11:19 networkhost kernel: [ 4.770359] ehci-pci 0000:00:1a.0: cache line size of 64 is not supported
  760. Feb 8 08:11:19 networkhost kernel: [ 4.770368] ehci-pci 0000:00:1a.0: irq 18, io mem 0xfb334000
  761. Feb 8 08:11:19 networkhost kernel: [ 4.781563] ehci-pci 0000:00:1a.0: USB 2.0 started, EHCI 1.00
  762. Feb 8 08:11:19 networkhost kernel: [ 4.781653] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002
  763. Feb 8 08:11:19 networkhost kernel: [ 4.781734] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  764. Feb 8 08:11:19 networkhost kernel: [ 4.781829] usb usb3: Product: EHCI Host Controller
  765. Feb 8 08:11:19 networkhost kernel: [ 4.781901] usb usb3: Manufacturer: Linux 4.2.6-1-pve ehci_hcd
  766. Feb 8 08:11:19 networkhost kernel: [ 4.781975] usb usb3: SerialNumber: 0000:00:1a.0
  767. Feb 8 08:11:19 networkhost kernel: [ 4.782133] hub 3-0:1.0: USB hub found
  768. Feb 8 08:11:19 networkhost kernel: [ 4.782206] hub 3-0:1.0: 2 ports detected
  769. Feb 8 08:11:19 networkhost kernel: [ 4.782404] ehci-pci 0000:00:1d.0: EHCI Host Controller
  770. Feb 8 08:11:19 networkhost kernel: [ 4.782479] ehci-pci 0000:00:1d.0: new USB bus registered, assigned bus number 4
  771. Feb 8 08:11:19 networkhost kernel: [ 4.782582] ehci-pci 0000:00:1d.0: debug port 2
  772. Feb 8 08:11:19 networkhost kernel: [ 4.786557] ehci-pci 0000:00:1d.0: cache line size of 64 is not supported
  773. Feb 8 08:11:19 networkhost kernel: [ 4.786560] ehci-pci 0000:00:1d.0: irq 18, io mem 0xfb333000
  774. Feb 8 08:11:19 networkhost kernel: [ 4.797585] ehci-pci 0000:00:1d.0: USB 2.0 started, EHCI 1.00
  775. Feb 8 08:11:19 networkhost kernel: [ 4.797676] usb usb4: New USB device found, idVendor=1d6b, idProduct=0002
  776. Feb 8 08:11:19 networkhost kernel: [ 4.797758] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1
  777. Feb 8 08:11:19 networkhost kernel: [ 4.797853] usb usb4: Product: EHCI Host Controller
  778. Feb 8 08:11:19 networkhost kernel: [ 4.797925] usb usb4: Manufacturer: Linux 4.2.6-1-pve ehci_hcd
  779. Feb 8 08:11:19 networkhost kernel: [ 4.797999] usb usb4: SerialNumber: 0000:00:1d.0
  780. Feb 8 08:11:19 networkhost kernel: [ 4.798155] hub 4-0:1.0: USB hub found
  781. Feb 8 08:11:19 networkhost kernel: [ 4.798227] hub 4-0:1.0: 2 ports detected
  782. Feb 8 08:11:19 networkhost kernel: [ 4.798372] ehci-platform: EHCI generic platform driver
  783. Feb 8 08:11:19 networkhost kernel: [ 4.798451] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
  784. Feb 8 08:11:19 networkhost kernel: [ 4.798528] ohci-pci: OHCI PCI platform driver
  785. Feb 8 08:11:19 networkhost kernel: [ 4.798608] ohci-platform: OHCI generic platform driver
  786. Feb 8 08:11:19 networkhost kernel: [ 4.798684] uhci_hcd: USB Universal Host Controller Interface driver
  787. Feb 8 08:11:19 networkhost kernel: [ 4.798789] i8042: PNP: No PS/2 controller found. Probing ports directly.
  788. Feb 8 08:11:19 networkhost kernel: [ 5.522645] usb 1-12: new high-speed USB device number 2 using xhci_hcd
  789. Feb 8 08:11:19 networkhost kernel: [ 5.522667] usb 4-1: new high-speed USB device number 2 using ehci-pci
  790. Feb 8 08:11:19 networkhost kernel: [ 5.522676] usb 3-1: new high-speed USB device number 2 using ehci-pci
  791. Feb 8 08:11:19 networkhost kernel: [ 5.651041] usb 1-12: New USB device found, idVendor=0557, idProduct=7000
  792. Feb 8 08:11:19 networkhost kernel: [ 5.651117] usb 1-12: New USB device strings: Mfr=0, Product=0, SerialNumber=0
  793. Feb 8 08:11:19 networkhost kernel: [ 5.651393] hub 1-12:1.0: USB hub found
  794. Feb 8 08:11:19 networkhost kernel: [ 5.651556] hub 1-12:1.0: 4 ports detected
  795. Feb 8 08:11:19 networkhost kernel: [ 5.655150] usb 4-1: New USB device found, idVendor=8087, idProduct=8002
  796. Feb 8 08:11:19 networkhost kernel: [ 5.655227] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
  797. Feb 8 08:11:19 networkhost kernel: [ 5.655329] usb 3-1: New USB device found, idVendor=8087, idProduct=800a
  798. Feb 8 08:11:19 networkhost kernel: [ 5.655405] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
  799. Feb 8 08:11:19 networkhost kernel: [ 5.655666] hub 4-1:1.0: USB hub found
  800. Feb 8 08:11:19 networkhost kernel: [ 5.655752] hub 3-1:1.0: USB hub found
  801. Feb 8 08:11:19 networkhost kernel: [ 5.655827] hub 4-1:1.0: 8 ports detected
  802. Feb 8 08:11:19 networkhost kernel: [ 5.655904] hub 3-1:1.0: 6 ports detected
  803. Feb 8 08:11:19 networkhost kernel: [ 5.702925] tsc: Refined TSC clocksource calibration: 3499.996 MHz
  804. Feb 8 08:11:19 networkhost kernel: [ 5.703004] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x32734d20948, max_idle_ns: 440795306379 ns
  805. Feb 8 08:11:19 networkhost kernel: [ 5.825907] i8042: No controller found
  806. Feb 8 08:11:19 networkhost kernel: [ 5.826042] mousedev: PS/2 mouse device common for all mice
  807. Feb 8 08:11:19 networkhost kernel: [ 5.826196] rtc_cmos 00:00: RTC can wake from S4
  808. Feb 8 08:11:19 networkhost kernel: [ 5.826364] rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0
  809. Feb 8 08:11:19 networkhost kernel: [ 5.826461] rtc_cmos 00:00: alarms up to one month, y3k, 114 bytes nvram, hpet irqs
  810. Feb 8 08:11:19 networkhost kernel: [ 5.826562] i2c /dev entries driver
  811. Feb 8 08:11:19 networkhost kernel: [ 5.826674] device-mapper: uevent: version 1.0.3
  812. Feb 8 08:11:19 networkhost kernel: [ 5.826803] device-mapper: ioctl: 4.33.0-ioctl (2015-8-18) initialised: dm-devel@redhat.com
  813. Feb 8 08:11:19 networkhost kernel: [ 5.826913] Intel P-state driver initializing.
  814. Feb 8 08:11:19 networkhost kernel: [ 5.827194] ledtrig-cpu: registered to indicate activity on CPUs
  815. Feb 8 08:11:19 networkhost kernel: [ 5.827363] PCCT header not found.
  816. Feb 8 08:11:19 networkhost kernel: [ 5.827746] NET: Registered protocol family 10
  817. Feb 8 08:11:19 networkhost kernel: [ 5.828129] NET: Registered protocol family 17
  818. Feb 8 08:11:19 networkhost kernel: [ 5.828219] bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
  819. Feb 8 08:11:19 networkhost kernel: [ 5.829512] Bridge firewalling registered
  820. Feb 8 08:11:19 networkhost kernel: [ 5.829602] Key type dns_resolver registered
  821. Feb 8 08:11:19 networkhost kernel: [ 5.830532] Loading compiled-in X.509 certificates
  822. Feb 8 08:11:19 networkhost kernel: [ 5.830628] registered taskstats version 1
  823. Feb 8 08:11:19 networkhost kernel: [ 5.830735] zswap: loading zswap
  824. Feb 8 08:11:19 networkhost kernel: [ 5.830809] zswap: using zbud pool
  825. Feb 8 08:11:19 networkhost kernel: [ 5.830886] zswap: using lzo compressor
  826. Feb 8 08:11:19 networkhost kernel: [ 5.832731] Key type trusted registered
  827. Feb 8 08:11:19 networkhost kernel: [ 5.834475] Key type encrypted registered
  828. Feb 8 08:11:19 networkhost kernel: [ 5.834554] AppArmor: AppArmor sha1 policy hashing enabled
  829. Feb 8 08:11:19 networkhost kernel: [ 5.834635] ima: No TPM chip found, activating TPM-bypass!
  830. Feb 8 08:11:19 networkhost kernel: [ 5.834746] evm: HMAC attrs: 0x1
  831. Feb 8 08:11:19 networkhost kernel: [ 5.835564] Magic number: 4:569:179
  832. Feb 8 08:11:19 networkhost kernel: [ 5.835645] event_source uncore_sbox_0: hash matches
  833. Feb 8 08:11:19 networkhost kernel: [ 5.835754] acpi device:1a0: hash matches
  834. Feb 8 08:11:19 networkhost kernel: [ 5.835887] acpi device:0f: hash matches
  835. Feb 8 08:11:19 networkhost kernel: [ 5.836050] rtc_cmos 00:00: setting system clock to 2016-02-08 13:11:07 UTC (1454937067)
  836. Feb 8 08:11:19 networkhost kernel: [ 5.836195] BIOS EDD facility v0.16 2004-Jun-25, 0 devices found
  837. Feb 8 08:11:19 networkhost kernel: [ 5.836269] EDD information not available.
  838. Feb 8 08:11:19 networkhost kernel: [ 5.836384] PM: Hibernation image not present or could not be loaded.
  839. Feb 8 08:11:19 networkhost kernel: [ 5.836711] Freeing unused kernel memory: 1480K (ffffffff81f4d000 - ffffffff820bf000)
  840. Feb 8 08:11:19 networkhost kernel: [ 5.836808] Write protecting the kernel read-only data: 14336k
  841. Feb 8 08:11:19 networkhost kernel: [ 5.837352] Freeing unused kernel memory: 1984K (ffff880001810000 - ffff880001a00000)
  842. Feb 8 08:11:19 networkhost kernel: [ 5.837561] Freeing unused kernel memory: 288K (ffff880001db8000 - ffff880001e00000)
  843. Feb 8 08:11:19 networkhost kernel: [ 5.848647] random: systemd-udevd urandom read with 3 bits of entropy available
  844. Feb 8 08:11:19 networkhost kernel: [ 5.876766] megasas: 06.807.10.00-rc1
  845. Feb 8 08:11:19 networkhost kernel: [ 5.876957] pps_core: LinuxPPS API ver. 1 registered
  846. Feb 8 08:11:19 networkhost kernel: [ 5.877042] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti <giometti@linux.it>
  847. Feb 8 08:11:19 networkhost kernel: [ 5.877227] megasas: FW now in Ready state
  848. Feb 8 08:11:19 networkhost kernel: [ 5.877381] megaraid_sas 0000:02:00.0: firmware supports msix : (16)
  849. Feb 8 08:11:19 networkhost kernel: [ 5.877474] megaraid_sas 0000:02:00.0: current msix/online cpus : (12/12)
  850. Feb 8 08:11:19 networkhost kernel: [ 5.877518] PTP clock support registered
  851. Feb 8 08:11:19 networkhost kernel: [ 5.877928] dca service started, version 1.12.1
  852. Feb 8 08:11:19 networkhost kernel: [ 5.878434] ahci 0000:00:11.4: version 3.0
  853. Feb 8 08:11:19 networkhost kernel: [ 5.878576] ahci 0000:00:11.4: AHCI 0001.0300 32 slots 4 ports 6 Gbps 0xf impl SATA mode
  854. Feb 8 08:11:19 networkhost kernel: [ 5.878681] ahci 0000:00:11.4: flags: 64bit ncq pm led clo pio slum part ems apst
  855. Feb 8 08:11:19 networkhost kernel: [ 5.878909] igb: Intel(R) Gigabit Ethernet Network Driver - version 5.2.18-k
  856. Feb 8 08:11:19 networkhost kernel: [ 5.878991] igb: Copyright (c) 2007-2014 Intel Corporation.
  857. Feb 8 08:11:19 networkhost kernel: [ 5.899218] megasas:IOC Init cmd success
  858. Feb 8 08:11:19 networkhost kernel: [ 5.899477] scsi host1: ahci
  859. Feb 8 08:11:19 networkhost kernel: [ 5.899625] scsi host2: ahci
  860. Feb 8 08:11:19 networkhost kernel: [ 5.899762] scsi host3: ahci
  861. Feb 8 08:11:19 networkhost kernel: [ 5.899897] scsi host4: ahci
  862. Feb 8 08:11:19 networkhost kernel: [ 5.899991] ata1: SATA max UDMA/133 abar m2048@0xfb338000 port 0xfb338100 irq 46
  863. Feb 8 08:11:19 networkhost kernel: [ 5.900089] ata2: SATA max UDMA/133 abar m2048@0xfb338000 port 0xfb338180 irq 46
  864. Feb 8 08:11:19 networkhost kernel: [ 5.900186] ata3: SATA max UDMA/133 abar m2048@0xfb338000 port 0xfb338200 irq 46
  865. Feb 8 08:11:19 networkhost kernel: [ 5.900282] ata4: SATA max UDMA/133 abar m2048@0xfb338000 port 0xfb338280 irq 46
  866. Feb 8 08:11:19 networkhost kernel: [ 5.900527] ahci 0000:00:1f.2: AHCI 0001.0300 32 slots 6 ports 6 Gbps 0x3f impl SATA mode
  867. Feb 8 08:11:19 networkhost kernel: [ 5.900625] ahci 0000:00:1f.2: flags: 64bit ncq pm led clo pio slum part ems apst
  868. Feb 8 08:11:19 networkhost kernel: [ 5.923259] megaraid_sas 0000:02:00.0: firmware type : Extended VD(240 VD)firmware
  869. Feb 8 08:11:19 networkhost kernel: [ 5.923360] megaraid_sas 0000:02:00.0: controller type : MR(1024MB)
  870. Feb 8 08:11:19 networkhost kernel: [ 5.932043] igb 0000:05:00.0: added PHC on eth0
  871. Feb 8 08:11:19 networkhost kernel: [ 5.932118] igb 0000:05:00.0: Intel(R) Gigabit Ethernet Network Connection
  872. Feb 8 08:11:19 networkhost kernel: [ 5.932194] igb 0000:05:00.0: eth0: (PCIe:5.0Gb/s:Width x4) 0c:c4:7a:6b:f2:4c
  873. Feb 8 08:11:19 networkhost kernel: [ 5.932342] igb 0000:05:00.0: eth0: PBA No: 050B00-000
  874. Feb 8 08:11:19 networkhost kernel: [ 5.932414] igb 0000:05:00.0: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s)
  875. Feb 8 08:11:19 networkhost kernel: [ 5.939807] scsi host5: ahci
  876. Feb 8 08:11:19 networkhost kernel: [ 5.939946] scsi host6: ahci
  877. Feb 8 08:11:19 networkhost kernel: [ 5.940100] scsi host7: ahci
  878. Feb 8 08:11:19 networkhost kernel: [ 5.940249] scsi host8: ahci
  879. Feb 8 08:11:19 networkhost kernel: [ 5.940387] scsi host9: ahci
  880. Feb 8 08:11:19 networkhost kernel: [ 5.940525] scsi host10: ahci
  881. Feb 8 08:11:19 networkhost kernel: [ 5.940620] ata5: SATA max UDMA/133 abar m2048@0xfb332000 port 0xfb332100 irq 58
  882. Feb 8 08:11:19 networkhost kernel: [ 5.940719] ata6: SATA max UDMA/133 abar m2048@0xfb332000 port 0xfb332180 irq 58
  883. Feb 8 08:11:19 networkhost kernel: [ 5.940815] ata7: SATA max UDMA/133 abar m2048@0xfb332000 port 0xfb332200 irq 58
  884. Feb 8 08:11:19 networkhost kernel: [ 5.940910] ata8: SATA max UDMA/133 abar m2048@0xfb332000 port 0xfb332280 irq 58
  885. Feb 8 08:11:19 networkhost kernel: [ 5.941006] ata9: SATA max UDMA/133 abar m2048@0xfb332000 port 0xfb332300 irq 58
  886. Feb 8 08:11:19 networkhost kernel: [ 5.941103] ata10: SATA max UDMA/133 abar m2048@0xfb332000 port 0xfb332380 irq 58
  887. Feb 8 08:11:19 networkhost kernel: [ 5.947273] usb 1-12.1: new low-speed USB device number 3 using xhci_hcd
  888. Feb 8 08:11:19 networkhost kernel: [ 5.947398] megasas: INIT adapter done
  889. Feb 8 08:11:19 networkhost kernel: [ 5.948579] megaraid_sas 0000:02:00.0: pci id : (0x1000)/(0x005b)/(0x1000)/(0x9276)
  890. Feb 8 08:11:19 networkhost kernel: [ 5.948676] megaraid_sas 0000:02:00.0: unevenspan support : no
  891. Feb 8 08:11:19 networkhost kernel: [ 5.948750] megaraid_sas 0000:02:00.0: disable ocr : no
  892. Feb 8 08:11:19 networkhost kernel: [ 5.948822] megaraid_sas 0000:02:00.0: firmware crash dump : no
  893. Feb 8 08:11:19 networkhost kernel: [ 5.948896] megaraid_sas 0000:02:00.0: secure jbod : no
  894. Feb 8 08:11:19 networkhost kernel: [ 5.948970] scsi host0: Avago SAS based MegaRAID driver
  895. Feb 8 08:11:19 networkhost kernel: [ 5.957390] scsi 0:2:0:0: Direct-Access LSI MR9271-4i 3.45 PQ: 0 ANSI: 5
  896. Feb 8 08:11:19 networkhost kernel: [ 5.963191] sd 0:2:0:0: [sda] 2342125568 512-byte logical blocks: (1.19 TB/1.08 TiB)
  897. Feb 8 08:11:19 networkhost kernel: [ 5.963216] sd 0:2:0:0: Attached scsi generic sg0 type 0
  898. Feb 8 08:11:19 networkhost kernel: [ 5.963481] sd 0:2:0:0: [sda] Write Protect is off
  899. Feb 8 08:11:19 networkhost kernel: [ 5.963554] sd 0:2:0:0: [sda] Mode Sense: 1f 00 00 08
  900. Feb 8 08:11:19 networkhost kernel: [ 5.963584] sd 0:2:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA
  901. Feb 8 08:11:19 networkhost kernel: [ 5.973431] sda: sda1 sda2 sda3 sda4
  902. Feb 8 08:11:19 networkhost kernel: [ 5.973777] sd 0:2:0:0: [sda] Attached SCSI disk
  903. Feb 8 08:11:19 networkhost kernel: [ 5.986596] igb 0000:05:00.1: added PHC on eth1
  904. Feb 8 08:11:19 networkhost kernel: [ 5.986673] igb 0000:05:00.1: Intel(R) Gigabit Ethernet Network Connection
  905. Feb 8 08:11:19 networkhost kernel: [ 5.986750] igb 0000:05:00.1: eth1: (PCIe:5.0Gb/s:Width x4) 0c:c4:7a:6b:f2:4d
  906. Feb 8 08:11:19 networkhost kernel: [ 5.986898] igb 0000:05:00.1: eth1: PBA No: 050B00-000
  907. Feb 8 08:11:19 networkhost kernel: [ 5.990955] igb 0000:05:00.1: Using MSI-X interrupts. 8 rx queue(s), 8 tx queue(s)
  908. Feb 8 08:11:19 networkhost kernel: [ 6.063685] usb 1-12.1: New USB device found, idVendor=0557, idProduct=2419
  909. Feb 8 08:11:19 networkhost kernel: [ 6.063763] usb 1-12.1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
  910. Feb 8 08:11:19 networkhost kernel: [ 6.063942] usb 1-12.1: ep 0x81 - rounding interval to 64 microframes, ep desc says 80 microframes
  911. Feb 8 08:11:19 networkhost kernel: [ 6.064049] usb 1-12.1: ep 0x82 - rounding interval to 32 microframes, ep desc says 40 microframes
  912. Feb 8 08:11:19 networkhost kernel: [ 6.065294] hidraw: raw HID events driver (C) Jiri Kosina
  913. Feb 8 08:11:19 networkhost kernel: [ 6.066941] usbcore: registered new interface driver usbhid
  914. Feb 8 08:11:19 networkhost kernel: [ 6.067019] usbhid: USB HID core driver
  915. Feb 8 08:11:19 networkhost kernel: [ 6.067552] usbcore: registered new interface driver usbkbd
  916. Feb 8 08:11:19 networkhost kernel: [ 6.067553] usbcore: registered new interface driver usbmouse
  917. Feb 8 08:11:19 networkhost kernel: [ 6.068235] input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-12/1-12.1/1-12.1:1.0/0003:0557:2419.0001/input/input2
  918. Feb 8 08:11:19 networkhost kernel: [ 6.123607] hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-12.1/input0
  919. Feb 8 08:11:19 networkhost kernel: [ 6.123787] input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-12/1-12.1/1-12.1:1.1/0003:0557:2419.0002/input/input3
  920. Feb 8 08:11:19 networkhost kernel: [ 6.123975] hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-12.1/input1
  921. Feb 8 08:11:19 networkhost kernel: [ 6.219671] ata3: SATA link down (SStatus 0 SControl 300)
  922. Feb 8 08:11:19 networkhost kernel: [ 6.219766] ata2: SATA link down (SStatus 0 SControl 300)
  923. Feb 8 08:11:19 networkhost kernel: [ 6.219862] ata1: SATA link down (SStatus 0 SControl 300)
  924. Feb 8 08:11:19 networkhost kernel: [ 6.219954] ata4: SATA link down (SStatus 0 SControl 300)
  925. Feb 8 08:11:19 networkhost kernel: [ 6.259727] ata8: SATA link down (SStatus 0 SControl 300)
  926. Feb 8 08:11:19 networkhost kernel: [ 6.259823] ata10: SATA link down (SStatus 0 SControl 300)
  927. Feb 8 08:11:19 networkhost kernel: [ 6.259916] ata7: SATA link down (SStatus 0 SControl 300)
  928. Feb 8 08:11:19 networkhost kernel: [ 6.260007] ata9: SATA link down (SStatus 0 SControl 300)
  929. Feb 8 08:11:19 networkhost kernel: [ 6.260099] ata5: SATA link down (SStatus 0 SControl 300)
  930. Feb 8 08:11:19 networkhost kernel: [ 6.260189] ata6: SATA link down (SStatus 0 SControl 300)
  931. Feb 8 08:11:19 networkhost kernel: [ 6.460014] raid6: sse2x1 gen() 11458 MB/s
  932. Feb 8 08:11:19 networkhost kernel: [ 6.528113] raid6: sse2x1 xor() 8965 MB/s
  933. Feb 8 08:11:19 networkhost kernel: [ 6.596209] raid6: sse2x2 gen() 14716 MB/s
  934. Feb 8 08:11:19 networkhost kernel: [ 6.664314] raid6: sse2x2 xor() 9784 MB/s
  935. Feb 8 08:11:19 networkhost kernel: [ 6.732435] raid6: sse2x4 gen() 13770 MB/s
  936. Feb 8 08:11:19 networkhost kernel: [ 6.800532] raid6: sse2x4 xor() 6851 MB/s
  937. Feb 8 08:11:19 networkhost kernel: [ 6.868625] raid6: avx2x1 gen() 15475 MB/s
  938. Feb 8 08:11:19 networkhost kernel: [ 6.936734] raid6: avx2x2 gen() 19681 MB/s
  939. Feb 8 08:11:19 networkhost kernel: [ 7.004822] raid6: avx2x4 gen() 20562 MB/s
  940. Feb 8 08:11:19 networkhost kernel: [ 7.004894] raid6: using algorithm avx2x4 gen() 20562 MB/s
  941. Feb 8 08:11:19 networkhost kernel: [ 7.004967] raid6: using avx2x2 recovery algorithm
  942. Feb 8 08:11:19 networkhost kernel: [ 7.005048] clocksource: Switched to clocksource tsc
  943. Feb 8 08:11:19 networkhost kernel: [ 7.005239] xor: automatically using best checksumming function:
  944. Feb 8 08:11:19 networkhost kernel: [ 7.044863] avx : 34855.000 MB/sec
  945. Feb 8 08:11:19 networkhost kernel: [ 7.047453] Btrfs loaded
  946. Feb 8 08:11:19 networkhost kernel: [ 8.357290] EXT4-fs (sda2): mounting ext3 file system using the ext4 subsystem
  947. Feb 8 08:11:19 networkhost kernel: [ 8.361474] EXT4-fs (sda2): mounted filesystem with ordered data mode. Opts: (null)
  948. Feb 8 08:11:19 networkhost kernel: [ 9.093789] random: nonblocking pool is initialized
  949. Feb 8 08:11:19 networkhost kernel: [ 9.210824] ipmi message handler version 39.2
  950. Feb 8 08:11:19 networkhost kernel: [ 9.211722] ipmi device interface
  951. Feb 8 08:11:19 networkhost kernel: [ 9.212717] Copyright (C) 2004 MontaVista Software - IPMI Powerdown via sys_reboot.
  952. Feb 8 08:11:19 networkhost kernel: [ 9.220408] IPMI System Interface driver.
  953. Feb 8 08:11:19 networkhost kernel: [ 9.220504] ipmi_si: probing via ACPI
  954. Feb 8 08:11:19 networkhost kernel: [ 9.220586] ipmi_si 00:05: [io 0x0ca2] regsize 1 spacing 1 irq 0
  955. Feb 8 08:11:19 networkhost kernel: [ 9.220660] ipmi_si: Adding ACPI-specified kcs state machine
  956. Feb 8 08:11:19 networkhost kernel: [ 9.220780] ipmi_si: probing via SMBIOS
  957. Feb 8 08:11:19 networkhost kernel: [ 9.220849] ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0
  958. Feb 8 08:11:19 networkhost kernel: [ 9.220922] ipmi_si: Adding SMBIOS-specified kcs state machine duplicate interface
  959. Feb 8 08:11:19 networkhost kernel: [ 9.221059] ipmi_si: Bad SPMI legacy 0
  960. Feb 8 08:11:19 networkhost kernel: [ 9.221128] ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x0, irq 0
  961. Feb 8 08:11:19 networkhost kernel: [ 9.356249] ipmi_si: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed.
  962. Feb 8 08:11:19 networkhost kernel: [ 9.389129] shpchp: Standard Hot Plug PCI Controller Driver version: 0.4
  963. Feb 8 08:11:19 networkhost kernel: [ 9.392155] ipmi_si 00:05: Found new BMC (man_id: 0x002a7c, prod_id: 0x0834, dev_id: 0x20)
  964. Feb 8 08:11:19 networkhost kernel: [ 9.392549] IPMI poweroff: ATCA Detect mfg 0x2A7C prod 0x834
  965. Feb 8 08:11:19 networkhost kernel: [ 9.392624] IPMI poweroff: Found a chassis style poweroff function
  966. Feb 8 08:11:19 networkhost kernel: [ 9.393262] ipmi_si 00:05: IPMI kcs interface initialized
  967. Feb 8 08:11:19 networkhost kernel: [ 9.398300] IPMI SSIF Interface driver
  968. Feb 8 08:11:19 networkhost kernel: [ 9.398372] IPMI: Bad SPMI legacy: 0
  969. Feb 8 08:11:19 networkhost kernel: [ 9.405148] EDAC MC: Ver: 3.0.0
  970. Feb 8 08:11:19 networkhost kernel: [ 9.409501] EDAC sbridge: Seeking for: PCI ID 8086:2fa0
  971. Feb 8 08:11:19 networkhost kernel: [ 9.409505] EDAC sbridge: Seeking for: PCI ID 8086:2fa0
  972. Feb 8 08:11:19 networkhost kernel: [ 9.409508] EDAC sbridge: Seeking for: PCI ID 8086:2ffc
  973. Feb 8 08:11:19 networkhost kernel: [ 9.409509] EDAC sbridge: Seeking for: PCI ID 8086:2ffc
  974. Feb 8 08:11:19 networkhost kernel: [ 9.409511] EDAC sbridge: Seeking for: PCI ID 8086:2ffd
  975. Feb 8 08:11:19 networkhost kernel: [ 9.409513] EDAC sbridge: Seeking for: PCI ID 8086:2ffd
  976. Feb 8 08:11:19 networkhost kernel: [ 9.409515] EDAC sbridge: Seeking for: PCI ID 8086:2f60
  977. Feb 8 08:11:19 networkhost kernel: [ 9.409518] EDAC sbridge: Seeking for: PCI ID 8086:2fa8
  978. Feb 8 08:11:19 networkhost kernel: [ 9.409519] EDAC sbridge: Seeking for: PCI ID 8086:2fa8
  979. Feb 8 08:11:19 networkhost kernel: [ 9.409521] EDAC sbridge: Seeking for: PCI ID 8086:2f71
  980. Feb 8 08:11:19 networkhost kernel: [ 9.409523] EDAC sbridge: Seeking for: PCI ID 8086:2f71
  981. Feb 8 08:11:19 networkhost kernel: [ 9.409525] EDAC sbridge: Seeking for: PCI ID 8086:2faa
  982. Feb 8 08:11:19 networkhost kernel: [ 9.409527] EDAC sbridge: Seeking for: PCI ID 8086:2faa
  983. Feb 8 08:11:19 networkhost kernel: [ 9.409529] EDAC sbridge: Seeking for: PCI ID 8086:2fab
  984. Feb 8 08:11:19 networkhost kernel: [ 9.409530] EDAC sbridge: Seeking for: PCI ID 8086:2fab
  985. Feb 8 08:11:19 networkhost kernel: [ 9.409532] EDAC sbridge: Seeking for: PCI ID 8086:2fac
  986. Feb 8 08:11:19 networkhost kernel: [ 9.409534] EDAC sbridge: Seeking for: PCI ID 8086:2fac
  987. Feb 8 08:11:19 networkhost kernel: [ 9.409536] EDAC sbridge: Seeking for: PCI ID 8086:2fad
  988. Feb 8 08:11:19 networkhost kernel: [ 9.409538] EDAC sbridge: Seeking for: PCI ID 8086:2fad
  989. Feb 8 08:11:19 networkhost kernel: [ 9.409540] EDAC sbridge: Seeking for: PCI ID 8086:2fbd
  990. Feb 8 08:11:19 networkhost kernel: [ 9.409542] EDAC sbridge: Seeking for: PCI ID 8086:2f68
  991. Feb 8 08:11:19 networkhost kernel: [ 9.409544] EDAC sbridge: Seeking for: PCI ID 8086:2f68
  992. Feb 8 08:11:19 networkhost kernel: [ 9.409546] EDAC sbridge: Seeking for: PCI ID 8086:2f79
  993. Feb 8 08:11:19 networkhost kernel: [ 9.409548] EDAC sbridge: Seeking for: PCI ID 8086:2f6a
  994. Feb 8 08:11:19 networkhost kernel: [ 9.409551] EDAC sbridge: Seeking for: PCI ID 8086:2f6b
  995. Feb 8 08:11:19 networkhost kernel: [ 9.409553] EDAC sbridge: Seeking for: PCI ID 8086:2f6c
  996. Feb 8 08:11:19 networkhost kernel: [ 9.409556] EDAC sbridge: Seeking for: PCI ID 8086:2f6d
  997. Feb 8 08:11:19 networkhost kernel: [ 9.409677] EDAC MC0: Giving out device to module sbridge_edac.c controller Haswell Socket#0: DEV 0000:ff:12.0 (POLLED)
  998. Feb 8 08:11:19 networkhost kernel: [ 9.409780] EDAC sbridge: Ver: 1.1.1
  999. Feb 8 08:11:19 networkhost kernel: [ 9.412160] i801_smbus 0000:00:1f.3: SMBus using PCI interrupt
  1000. Feb 8 08:11:19 networkhost kernel: [ 9.413585] ioatdma: Intel(R) QuickData Technology Driver 4.00
  1001. Feb 8 08:11:19 networkhost kernel: [ 9.413872] igb 0000:05:00.0: DCA enabled
  1002. Feb 8 08:11:19 networkhost kernel: [ 9.413953] igb 0000:05:00.1: DCA enabled
  1003. Feb 8 08:11:19 networkhost kernel: [ 9.419046] mei_me 0000:00:16.0: Device doesn't have valid ME Interface
  1004. Feb 8 08:11:19 networkhost kernel: [ 9.444892] input: PC Speaker as /devices/platform/pcspkr/input/input4
  1005. Feb 8 08:11:19 networkhost kernel: [ 9.499033] AVX2 version of gcm_enc/dec engaged.
  1006. Feb 8 08:11:19 networkhost kernel: [ 9.499106] AES CTR mode by8 optimization enabled
  1007. Feb 8 08:11:19 networkhost kernel: [ 9.511262] [drm] Initialized drm 1.1.0 20060810
  1008. Feb 8 08:11:19 networkhost kernel: [ 9.547281] Error: Driver 'pcspkr' is already registered, aborting...
  1009. Feb 8 08:11:19 networkhost kernel: [ 9.558933] [drm] AST 2400 detected
  1010. Feb 8 08:11:19 networkhost kernel: [ 9.559018] [drm] Analog VGA only
  1011. Feb 8 08:11:19 networkhost kernel: [ 9.559101] [drm] dram 1632000000 1 16 01000000
  1012. Feb 8 08:11:19 networkhost kernel: [ 9.559196] [TTM] Zone kernel: Available graphics memory: 32933902 kiB
  1013. Feb 8 08:11:19 networkhost kernel: [ 9.559271] [TTM] Zone dma32: Available graphics memory: 2097152 kiB
  1014. Feb 8 08:11:19 networkhost kernel: [ 9.559346] [TTM] Initializing pool allocator
  1015. Feb 8 08:11:19 networkhost kernel: [ 9.559417] [TTM] Initializing DMA pool allocator
  1016. Feb 8 08:11:19 networkhost kernel: [ 9.563261] fbcon: astdrmfb (fb0) is primary device
  1017. Feb 8 08:11:19 networkhost kernel: [ 9.607222] Console: switching to colour frame buffer device 128x48
  1018. Feb 8 08:11:19 networkhost kernel: [ 9.630936] ast 0000:09:00.0: fb0: astdrmfb frame buffer device
  1019. Feb 8 08:11:19 networkhost kernel: [ 9.630937] ast 0000:09:00.0: registered panic notifier
  1020. Feb 8 08:11:19 networkhost kernel: [ 9.644803] [drm] Initialized ast 0.1.0 20120228 for 0000:09:00.0 on minor 0
  1021. Feb 8 08:11:19 networkhost kernel: [ 9.653516] Adding 1047548k swap on /dev/sda3. Priority:-1 extents:1 across:1047548k FS
  1022. Feb 8 08:11:19 networkhost kernel: [ 9.660860] power_meter ACPI000D:00: Found ACPI power meter.
  1023. Feb 8 08:11:19 networkhost kernel: [ 9.660890] power_meter ACPI000D:00: Ignoring unsafe software power cap!
  1024. Feb 8 08:11:19 networkhost kernel: [ 9.661014] wmi: Mapper loaded
  1025. Feb 8 08:11:19 networkhost kernel: [ 9.671230] intel_rapl: Found RAPL domain package
  1026. Feb 8 08:11:19 networkhost kernel: [ 9.671255] intel_rapl: Found RAPL domain dram
  1027. Feb 8 08:11:19 networkhost kernel: [ 9.671273] intel_rapl: DRAM domain energy unit 15300pj
  1028. Feb 8 08:11:19 networkhost kernel: [ 9.745190] EXT4-fs (sda2): re-mounted. Opts: errors=remount-ro
  1029. Feb 8 08:11:19 networkhost kernel: [ 10.043341] zavl: module license 'CDDL' taints kernel.
  1030. Feb 8 08:11:19 networkhost kernel: [ 10.043715] Disabling lock debugging due to kernel taint
  1031. Feb 8 08:11:19 networkhost kernel: [ 10.050991] SPL: Loaded module v0.6.5.4-1
  1032. Feb 8 08:11:19 networkhost kernel: [ 10.146240] ZFS: Loaded module v0.6.5.4-1, ZFS pool version 5000, ZFS filesystem version 5
  1033. Feb 8 08:11:19 networkhost kernel: [ 10.962531] EXT4-fs (dm-0): mounting ext3 file system using the ext4 subsystem
  1034. Feb 8 08:11:19 networkhost kernel: [ 10.982305] EXT4-fs (dm-0): mounted filesystem with ordered data mode. Opts: (null)
  1035. Feb 8 08:11:19 networkhost kernel: [ 11.164139] Netfilter messages via NETLINK v0.30.
  1036. Feb 8 08:11:19 networkhost kernel: [ 11.462277] device eth0 entered promiscuous mode
  1037. Feb 8 08:11:19 networkhost kernel: [ 11.578033] IPv6: ADDRCONF(NETDEV_UP): vmbr0: link is not ready
  1038. Feb 8 08:11:19 networkhost kernel: [ 13.734813] device eth0 left promiscuous mode
  1039. Feb 8 08:11:19 networkhost kernel: [ 15.473595] igb 0000:05:00.0 eth0: igb: eth0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
  1040. Feb 8 08:11:19 networkhost kernel: [ 15.474193] vmbr0: port 1(eth0) entered forwarding state
  1041. Feb 8 08:11:19 networkhost kernel: [ 15.474699] vmbr0: port 1(eth0) entered forwarding state
  1042. Feb 8 08:11:19 networkhost kernel: [ 15.475319] IPv6: ADDRCONF(NETDEV_CHANGE): vmbr0: link becomes ready
  1043. Feb 8 08:11:19 networkhost kernel: [ 17.253184] Loading iSCSI transport class v2.0-870.
  1044. Feb 8 08:11:19 networkhost kernel: [ 17.270064] iscsi: registered transport (tcp)
  1045. Feb 8 08:11:19 networkhost kernel: [ 17.330115] iscsi: registered transport (iser)
  1046. Feb 8 08:11:19 networkhost kernel: [ 17.401372] RPC: Registered named UNIX socket transport module.
  1047. Feb 8 08:11:19 networkhost kernel: [ 17.401372] RPC: Registered udp transport module.
  1048. Feb 8 08:11:19 networkhost kernel: [ 17.401373] RPC: Registered tcp transport module.
  1049. Feb 8 08:11:19 networkhost kernel: [ 17.401373] RPC: Registered tcp NFSv4.1 backchannel transport module.
  1050. Feb 8 08:11:19 networkhost kernel: [ 17.413167] FS-Cache: Loaded
  1051. Feb 8 08:11:19 networkhost kernel: [ 17.437778] FS-Cache: Netfs 'nfs' registered for caching
  1052. Feb 8 08:11:19 networkhost kernel: [ 17.463087] Installing knfsd (copyright (C) 1996 okir@monad.swb.de).
  1053. Feb 8 08:11:19 networkhost kernel: [ 17.628429] audit: type=1400 audit(1454937079.271:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default" pid=1369 comm="apparmor_parser"
  1054. Feb 8 08:11:19 networkhost kernel: [ 17.629392] audit: type=1400 audit(1454937079.271:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-mounting" pid=1369 comm="apparmor_parser"
  1055. Feb 8 08:11:19 networkhost kernel: [ 17.630393] audit: type=1400 audit(1454937079.271:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-nesting" pid=1369 comm="apparmor_parser"
  1056. Feb 8 08:11:19 networkhost kernel: [ 17.634032] audit: type=1400 audit(1454937079.275:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" pid=1369 comm="apparmor_parser"
  1057. Feb 8 08:11:19 networkhost kernel: [ 17.647429] audit: type=1400 audit(1454937079.287:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/sbin/named" pid=1369 comm="apparmor_parser"
  1058. Feb 8 08:11:19 networkhost kernel: [ 17.805300] softdog: Software Watchdog Timer: 0.08 initialized. soft_noboot=0 soft_margin=60 sec soft_panic=0 (nowayout=0)
  1059. Feb 8 08:11:19 networkhost kernel: [ 17.823033] cgroup: new mount options do not match the existing superblock, will be ignored
  1060. Feb 8 08:11:19 networkhost kernel: [ 17.877666] cgroup: new mount options do not match the existing superblock, will be ignored
  1061. Feb 8 08:11:19 networkhost kernel: [ 17.894097] ip_tables: (C) 2000-2006 Netfilter Core Team
  1062. Feb 8 08:11:19 networkhost kernel: [ 18.048645] audit: type=1400 audit(1454937079.687:7): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1423 comm="named" requested_mask="w" denied_mask="w" fsuid=0 ouid=0
  1063. Feb 8 08:11:19 networkhost kernel: [ 18.089079] audit: type=1400 audit(1454937079.731:8): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1423 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1064. Feb 8 08:11:19 networkhost kernel: [ 18.090196] audit: type=1400 audit(1454937079.731:9): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1423 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1065. Feb 8 08:11:19 networkhost kernel: [ 18.091303] audit: type=1400 audit(1454937079.731:10): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1423 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1066. Feb 8 08:11:19 networkhost kernel: [ 18.092409] audit: type=1400 audit(1454937079.731:11): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1423 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1067. Feb 8 08:11:21 networkhost kernel: [ 19.899543] ip6_tables: (C) 2000-2006 Netfilter Core Team
  1068. Feb 8 08:11:21 networkhost kernel: [ 19.935778] ip_set: protocol 6
  1069. Feb 8 08:11:23 networkhost pve-manager[1652]: <root@pam> starting task UPID:networkhost:00000675:0000086A:56B893FB:startall::root@pam:
  1070. Feb 8 08:11:23 networkhost pve-manager[1652]: <root@pam> end task UPID:networkhost:00000675:0000086A:56B893FB:startall::root@pam: OK
  1071. Feb 8 08:15:58 networkhost pvedaemon[1639]: <root@pam> successful auth for user 'root@pam'
  1072. Feb 8 08:16:05 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:0000094C:00007670:56B89515:vncproxy:108:root@pam:
  1073. Feb 8 08:16:07 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:00000950:0000771B:56B89517:qmstart:108:root@pam:
  1074. Feb 8 08:16:08 networkhost kernel: [ 306.383221] device tap108i0 entered promiscuous mode
  1075. Feb 8 08:16:08 networkhost kernel: [ 306.386593] device eth0 entered promiscuous mode
  1076. Feb 8 08:16:08 networkhost kernel: [ 306.392879] vmbr0: port 2(tap108i0) entered forwarding state
  1077. Feb 8 08:16:08 networkhost kernel: [ 306.392894] vmbr0: port 2(tap108i0) entered forwarding state
  1078. Feb 8 08:16:09 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:0000096A:00007808:56B89519:vncproxy:110:root@pam:
  1079. Feb 8 08:16:10 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:0000096E:0000784D:56B8951A:qmstart:110:root@pam:
  1080. Feb 8 08:16:10 networkhost kernel: [ 308.866018] device tap110i0 entered promiscuous mode
  1081. Feb 8 08:16:10 networkhost kernel: [ 308.869860] vmbr0: port 3(tap110i0) entered forwarding state
  1082. Feb 8 08:16:10 networkhost kernel: [ 308.869879] vmbr0: port 3(tap110i0) entered forwarding state
  1083. Feb 8 08:16:12 networkhost kernel: [ 310.147916] kvm: zapping shadow pages for mmio generation wraparound
  1084. Feb 8 08:16:12 networkhost kernel: [ 310.148352] kvm: zapping shadow pages for mmio generation wraparound
  1085. Feb 8 08:16:12 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:0000098C:0000790F:56B8951C:vncproxy:114:root@pam:
  1086. Feb 8 08:16:13 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:0000098E:0000793D:56B8951D:qmstart:114:root@pam:
  1087. Feb 8 08:16:13 networkhost kernel: [ 311.274981] device tap114i0 entered promiscuous mode
  1088. Feb 8 08:16:13 networkhost kernel: [ 311.279207] vmbr0: port 4(tap114i0) entered forwarding state
  1089. Feb 8 08:16:13 networkhost kernel: [ 311.279227] vmbr0: port 4(tap114i0) entered forwarding state
  1090. Feb 8 08:16:14 networkhost kernel: [ 311.924304] kvm: zapping shadow pages for mmio generation wraparound
  1091. Feb 8 08:16:14 networkhost kernel: [ 311.924679] kvm: zapping shadow pages for mmio generation wraparound
  1092. Feb 8 08:16:14 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:000009A8:000079E5:56B8951E:vncproxy:115:root@pam:
  1093. Feb 8 08:16:15 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:000009AC:00007A3F:56B8951F:qmstart:115:root@pam:
  1094. Feb 8 08:16:15 networkhost kernel: [ 313.842985] device tap115i0 entered promiscuous mode
  1095. Feb 8 08:16:15 networkhost kernel: [ 313.847615] vmbr0: port 5(tap115i0) entered forwarding state
  1096. Feb 8 08:16:15 networkhost kernel: [ 313.847636] vmbr0: port 5(tap115i0) entered forwarding state
  1097. Feb 8 08:16:16 networkhost kernel: [ 314.225204] kvm: zapping shadow pages for mmio generation wraparound
  1098. Feb 8 08:16:16 networkhost kernel: [ 314.225580] kvm: zapping shadow pages for mmio generation wraparound
  1099. Feb 8 08:16:17 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:000009C4:00007AFE:56B89521:vncproxy:116:root@pam:
  1100. Feb 8 08:16:17 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:000009C6:00007B25:56B89521:qmstart:116:root@pam:
  1101. Feb 8 08:16:18 networkhost kernel: [ 316.146069] device tap116i0 entered promiscuous mode
  1102. Feb 8 08:16:18 networkhost kernel: [ 316.151006] vmbr0: port 6(tap116i0) entered forwarding state
  1103. Feb 8 08:16:18 networkhost kernel: [ 316.151027] vmbr0: port 6(tap116i0) entered forwarding state
  1104. Feb 8 08:16:19 networkhost kernel: [ 317.012497] kvm: zapping shadow pages for mmio generation wraparound
  1105. Feb 8 08:16:19 networkhost kernel: [ 317.012890] kvm: zapping shadow pages for mmio generation wraparound
  1106. Feb 8 08:16:20 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:000009E0:00007C0D:56B89524:vncproxy:117:root@pam:
  1107. Feb 8 08:16:21 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:000009EA:00007C59:56B89525:qmstart:117:root@pam:
  1108. Feb 8 08:16:21 networkhost kernel: [ 318.977500] kvm: zapping shadow pages for mmio generation wraparound
  1109. Feb 8 08:16:21 networkhost kernel: [ 318.977903] kvm: zapping shadow pages for mmio generation wraparound
  1110. Feb 8 08:16:21 networkhost kernel: [ 319.382613] device tap117i0 entered promiscuous mode
  1111. Feb 8 08:16:21 networkhost kernel: [ 319.388209] vmbr0: port 7(tap117i0) entered forwarding state
  1112. Feb 8 08:16:21 networkhost kernel: [ 319.388230] vmbr0: port 7(tap117i0) entered forwarding state
  1113. Feb 8 08:16:22 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A0A:00007D02:56B89526:vncproxy:118:root@pam:
  1114. Feb 8 08:16:23 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A0E:00007D4B:56B89527:qmstart:118:root@pam:
  1115. Feb 8 08:16:23 networkhost kernel: [ 321.660236] device tap118i0 entered promiscuous mode
  1116. Feb 8 08:16:23 networkhost kernel: [ 321.665708] vmbr0: port 8(tap118i0) entered forwarding state
  1117. Feb 8 08:16:23 networkhost kernel: [ 321.665732] vmbr0: port 8(tap118i0) entered forwarding state
  1118. Feb 8 08:16:24 networkhost kernel: [ 322.441442] kvm: zapping shadow pages for mmio generation wraparound
  1119. Feb 8 08:16:24 networkhost kernel: [ 322.441826] kvm: zapping shadow pages for mmio generation wraparound
  1120. Feb 8 08:16:26 networkhost kernel: [ 324.507157] kvm: zapping shadow pages for mmio generation wraparound
  1121. Feb 8 08:16:26 networkhost kernel: [ 324.507698] kvm: zapping shadow pages for mmio generation wraparound
  1122. Feb 8 08:16:26 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:00000A26:00007E88:56B8952A:vncproxy:119:root@pam:
  1123. Feb 8 08:16:27 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A2A:00007EF4:56B8952B:qmstart:119:root@pam:
  1124. Feb 8 08:16:28 networkhost kernel: [ 325.932202] device tap119i0 entered promiscuous mode
  1125. Feb 8 08:16:28 networkhost kernel: [ 325.938060] vmbr0: port 9(tap119i0) entered forwarding state
  1126. Feb 8 08:16:28 networkhost kernel: [ 325.938085] vmbr0: port 9(tap119i0) entered forwarding state
  1127. Feb 8 08:16:29 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A44:00007FBE:56B8952D:vncproxy:121:root@pam:
  1128. Feb 8 08:16:30 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:00000A48:0000802D:56B8952E:qmstart:121:root@pam:
  1129. Feb 8 08:16:31 networkhost kernel: [ 329.061219] device tap121i0 entered promiscuous mode
  1130. Feb 8 08:16:31 networkhost kernel: [ 329.067414] vmbr0: port 10(tap121i0) entered forwarding state
  1131. Feb 8 08:16:31 networkhost kernel: [ 329.067438] vmbr0: port 10(tap121i0) entered forwarding state
  1132. Feb 8 08:16:31 networkhost kernel: [ 329.582315] kvm: zapping shadow pages for mmio generation wraparound
  1133. Feb 8 08:16:31 networkhost kernel: [ 329.582858] kvm: zapping shadow pages for mmio generation wraparound
  1134. Feb 8 08:16:32 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A68:000080F4:56B89530:vncproxy:122:root@pam:
  1135. Feb 8 08:16:33 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A6A:00008146:56B89531:qmstart:122:root@pam:
  1136. Feb 8 08:16:34 networkhost kernel: [ 332.024993] device tap122i0 entered promiscuous mode
  1137. Feb 8 08:16:34 networkhost kernel: [ 332.032014] vmbr0: port 11(tap122i0) entered forwarding state
  1138. Feb 8 08:16:34 networkhost kernel: [ 332.032039] vmbr0: port 11(tap122i0) entered forwarding state
  1139. Feb 8 08:16:35 networkhost kernel: [ 333.190356] kvm: zapping shadow pages for mmio generation wraparound
  1140. Feb 8 08:16:35 networkhost kernel: [ 333.190895] kvm: zapping shadow pages for mmio generation wraparound
  1141. Feb 8 08:16:35 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:00000A84:00008232:56B89533:vncproxy:125:root@pam:
  1142. Feb 8 08:16:36 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000A88:00008279:56B89534:qmstart:125:root@pam:
  1143. Feb 8 08:16:37 networkhost kernel: [ 335.096796] device tap125i0 entered promiscuous mode
  1144. Feb 8 08:16:37 networkhost kernel: [ 335.104183] vmbr0: port 12(tap125i0) entered forwarding state
  1145. Feb 8 08:16:37 networkhost kernel: [ 335.104208] vmbr0: port 12(tap125i0) entered forwarding state
  1146. Feb 8 08:16:38 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:00000AA6:0000831F:56B89536:vncproxy:127:root@pam:
  1147. Feb 8 08:16:38 networkhost kernel: [ 336.386958] kvm: zapping shadow pages for mmio generation wraparound
  1148. Feb 8 08:16:38 networkhost kernel: [ 336.387355] kvm: zapping shadow pages for mmio generation wraparound
  1149. Feb 8 08:16:39 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:00000AAA:0000836D:56B89537:qmstart:127:root@pam:
  1150. Feb 8 08:16:39 networkhost kernel: [ 337.570210] device tap127i0 entered promiscuous mode
  1151. Feb 8 08:16:39 networkhost kernel: [ 337.578959] vmbr0: port 13(tap127i0) entered forwarding state
  1152. Feb 8 08:16:39 networkhost kernel: [ 337.578998] vmbr0: port 13(tap127i0) entered forwarding state
  1153. Feb 8 08:16:40 networkhost kernel: [ 338.175243] kvm: zapping shadow pages for mmio generation wraparound
  1154. Feb 8 08:16:40 networkhost kernel: [ 338.175773] kvm: zapping shadow pages for mmio generation wraparound
  1155. Feb 8 08:16:41 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000AC2:00008439:56B89539:vncproxy:128:root@pam:
  1156. Feb 8 08:16:41 networkhost pvedaemon[1639]: <root@pam> starting task UPID:networkhost:00000AC5:00008470:56B89539:qmstart:128:root@pam:
  1157. Feb 8 08:16:42 networkhost kernel: [ 340.169751] device tap128i0 entered promiscuous mode
  1158. Feb 8 08:16:42 networkhost kernel: [ 340.182209] vmbr0: port 14(tap128i0) entered forwarding state
  1159. Feb 8 08:16:42 networkhost kernel: [ 340.182248] vmbr0: port 14(tap128i0) entered forwarding state
  1160. Feb 8 08:16:42 networkhost kernel: [ 340.601750] kvm: zapping shadow pages for mmio generation wraparound
  1161. Feb 8 08:16:42 networkhost kernel: [ 340.602321] kvm: zapping shadow pages for mmio generation wraparound
  1162. Feb 8 08:16:43 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:00000AE4:0000851A:56B8953B:vncproxy:129:root@pam:
  1163. Feb 8 08:16:44 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000AE8:00008561:56B8953C:qmstart:129:root@pam:
  1164. Feb 8 08:16:44 networkhost kernel: [ 342.875889] device tap129i0 entered promiscuous mode
  1165. Feb 8 08:16:44 networkhost kernel: [ 342.885709] vmbr0: port 15(tap129i0) entered forwarding state
  1166. Feb 8 08:16:44 networkhost kernel: [ 342.886292] vmbr0: port 15(tap129i0) entered forwarding state
  1167. Feb 8 08:16:46 networkhost kernel: [ 344.558073] kvm: zapping shadow pages for mmio generation wraparound
  1168. Feb 8 08:16:46 networkhost kernel: [ 344.558623] kvm: zapping shadow pages for mmio generation wraparound
  1169. Feb 8 08:16:48 networkhost pvedaemon[1637]: <root@pam> starting task UPID:networkhost:00000B00:000086EE:56B89540:vncproxy:130:root@pam:
  1170. Feb 8 08:16:48 networkhost kernel: [ 346.869612] kvm: zapping shadow pages for mmio generation wraparound
  1171. Feb 8 08:16:48 networkhost kernel: [ 346.870160] kvm: zapping shadow pages for mmio generation wraparound
  1172. Feb 8 08:16:49 networkhost pvedaemon[1638]: <root@pam> starting task UPID:networkhost:00000B04:00008759:56B89541:qmstart:130:root@pam:
  1173. Feb 8 08:16:49 networkhost kernel: [ 347.684542] device tap130i0 entered promiscuous mode
  1174. Feb 8 08:16:49 networkhost kernel: [ 347.697858] vmbr0: port 16(tap130i0) entered forwarding state
  1175. Feb 8 08:16:49 networkhost kernel: [ 347.698445] vmbr0: port 16(tap130i0) entered forwarding state
  1176. Feb 8 08:16:53 networkhost kernel: [ 351.252862] kvm: zapping shadow pages for mmio generation wraparound
  1177. Feb 8 08:16:53 networkhost kernel: [ 351.253404] kvm: zapping shadow pages for mmio generation wraparound
  1178. Feb 8 08:18:17 networkhost kernel: [ 435.650235] hrtimer: interrupt took 4433 ns
  1179. Feb 8 08:21:27 networkhost pvedaemon[1637]: <root@pam> successful auth for user 'prowillshow@gmail.com@pve'
  1180. Feb 8 08:24:22 networkhost pvedaemon[1639]: <root@pam> successful auth for user 'osiemexit@gmail.com@pve'
  1181. Feb 8 08:24:36 networkhost pvedaemon[1639]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00000FF5:00013DB7:56B89714:vncproxy:109:osiemexit@gmail.com@pve:
  1182. Feb 8 08:24:44 networkhost pvedaemon[1638]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00000FFF:000140F8:56B8971C:qmstart:109:osiemexit@gmail.com@pve:
  1183. Feb 8 08:24:44 networkhost kernel: [ 823.325321] device tap109i0 entered promiscuous mode
  1184. Feb 8 08:24:44 networkhost kernel: [ 823.334766] vmbr0: port 17(tap109i0) entered forwarding state
  1185. Feb 8 08:24:44 networkhost kernel: [ 823.335125] vmbr0: port 17(tap109i0) entered forwarding state
  1186. Feb 8 08:24:47 networkhost kernel: [ 826.275582] kvm: zapping shadow pages for mmio generation wraparound
  1187. Feb 8 08:24:47 networkhost kernel: [ 826.275992] kvm: zapping shadow pages for mmio generation wraparound
  1188. Feb 8 08:24:49 networkhost pvedaemon[1638]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00001019:000142E4:56B89721:vncproxy:126:osiemexit@gmail.com@pve:
  1189. Feb 8 08:24:50 networkhost pvedaemon[1639]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:0000101D:00014362:56B89722:qmstart:126:osiemexit@gmail.com@pve:
  1190. Feb 8 08:24:50 networkhost kernel: [ 829.509810] device tap126i0 entered promiscuous mode
  1191. Feb 8 08:24:50 networkhost kernel: [ 829.519534] vmbr0: port 18(tap126i0) entered forwarding state
  1192. Feb 8 08:24:50 networkhost kernel: [ 829.519882] vmbr0: port 18(tap126i0) entered forwarding state
  1193. Feb 8 08:24:54 networkhost kernel: [ 833.128302] kvm: zapping shadow pages for mmio generation wraparound
  1194. Feb 8 08:24:54 networkhost kernel: [ 833.128872] kvm: zapping shadow pages for mmio generation wraparound
  1195. Feb 8 08:25:16 networkhost pvedaemon[1638]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:000010BA:00014D83:56B8973C:vncproxy:109:osiemexit@gmail.com@pve:
  1196. Feb 8 08:26:35 networkhost pvedaemon[1638]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00001171:00016C3A:56B8978B:vncproxy:126:osiemexit@gmail.com@pve:
  1197. Feb 8 08:27:56 networkhost pvedaemon[1638]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:000011DB:00018C11:56B897DC:vncproxy:109:osiemexit@gmail.com@pve:
  1198. Feb 8 08:28:06 networkhost pvedaemon[1637]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00001211:00018FE6:56B897E6:vncproxy:126:osiemexit@gmail.com@pve:
  1199. Feb 8 08:28:21 networkhost pvedaemon[4456]: <root@pam> successful auth for user 'root@pam'
  1200. Feb 8 09:25:27 networkhost kernel: [ 4471.462735] audit_printk_skb: 378 callbacks suppressed
  1201. Feb 8 09:25:27 networkhost kernel: [ 4471.463097] audit: type=1400 audit(1454941527.406:138): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1451 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1202. Feb 8 11:03:02 networkhost kernel: [10334.857549] audit: type=1400 audit(1454947382.130:139): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1452 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1203. Feb 8 11:03:02 networkhost kernel: [10334.858573] audit: type=1400 audit(1454947382.130:140): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1446 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1204. Feb 8 11:03:05 networkhost kernel: [10337.982123] audit: type=1400 audit(1454947385.250:141): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1446 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1205. Feb 8 11:03:06 networkhost kernel: [10339.640663] audit: type=1400 audit(1454947386.906:142): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1449 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1206. Feb 8 12:17:27 networkhost kernel: [14807.099227] perf interrupt took too long (2503 > 2500), lowering kernel.perf_event_max_sample_rate to 50000
  1207. Feb 8 12:33:41 networkhost pvedaemon[4456]: <root@pam> successful auth for user 'osiemexit@gmail.com@pve'
  1208. Feb 8 12:33:58 networkhost pvedaemon[4456]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00006876:00181259:56B8D186:vncproxy:109:osiemexit@gmail.com@pve:
  1209. Feb 8 12:34:22 networkhost pvedaemon[5128]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:000068BC:00181BC8:56B8D19E:vncproxy:126:osiemexit@gmail.com@pve:
  1210. Feb 8 15:19:30 networkhost kernel: [25745.561829] audit: type=1400 audit(1454962770.051:143): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1448 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1211. Feb 8 16:17:11 networkhost pvedaemon[4456]: <root@pam> successful auth for user 'osiemexit@gmail.com@pve'
  1212. Feb 8 16:17:23 networkhost pvedaemon[5019]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:0000398B:002C86CF:56B905E3:vncproxy:109:osiemexit@gmail.com@pve:
  1213. Feb 8 16:18:02 networkhost pvedaemon[5128]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:000039DA:002C95E5:56B9060A:vncproxy:126:osiemexit@gmail.com@pve:
  1214. Feb 8 16:23:31 networkhost pvedaemon[4456]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00003BB6:002D1699:56B90753:vncproxy:109:osiemexit@gmail.com@pve:
  1215. Feb 8 16:30:46 networkhost pvedaemon[5128]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00003E2B:002DC081:56B90906:vncproxy:126:osiemexit@gmail.com@pve:
  1216. Feb 8 16:31:36 networkhost pvedaemon[5019]: <root@pam> successful auth for user 'osiemexit@gmail.com@pve'
  1217. Feb 8 16:34:04 networkhost pvedaemon[4456]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00003F70:002E0DE1:56B909CC:vncproxy:109:osiemexit@gmail.com@pve:
  1218. Feb 8 16:58:31 networkhost kernel: [31695.578082] audit: type=1400 audit(1454968711.276:144): apparmor="DENIED" operation="sendmsg" profile="/usr/sbin/named" name="/run/systemd/journal/dev-log" pid=1450 comm="named" requested_mask="w" denied_mask="w" fsuid=109 ouid=0
  1219. Feb 8 17:58:11 networkhost pvedaemon[4456]: <root@pam> successful auth for user 'root@pam'
  1220. Feb 8 18:01:24 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00005FCD:00360C8D:56B91E44:vncproxy:108:root@pam:
  1221. Feb 8 18:03:02 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:0000607A:003632FD:56B91EA6:vncproxy:110:root@pam:
  1222. Feb 8 18:04:31 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:000060ED:00365598:56B91EFF:vncproxy:111:root@pam:
  1223. Feb 8 18:04:33 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:000060F7:003656A5:56B91F01:qmstart:111:root@pam:
  1224. Feb 8 18:04:34 networkhost kernel: [35664.407587] device tap111i0 entered promiscuous mode
  1225. Feb 8 18:04:34 networkhost kernel: [35664.418111] vmbr0: port 19(tap111i0) entered forwarding state
  1226. Feb 8 18:04:34 networkhost kernel: [35664.418716] vmbr0: port 19(tap111i0) entered forwarding state
  1227. Feb 8 18:04:36 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:00006111:0036578B:56B91F04:vncproxy:112:root@pam:
  1228. Feb 8 18:04:37 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:00006115:0036580D:56B91F05:qmstart:112:root@pam:
  1229. Feb 8 18:04:37 networkhost kernel: [35667.942307] kvm: zapping shadow pages for mmio generation wraparound
  1230. Feb 8 18:04:37 networkhost kernel: [35667.942765] kvm: zapping shadow pages for mmio generation wraparound
  1231. Feb 8 18:04:37 networkhost kernel: [35668.037776] device tap112i0 entered promiscuous mode
  1232. Feb 8 18:04:37 networkhost kernel: [35668.048531] vmbr0: port 20(tap112i0) entered forwarding state
  1233. Feb 8 18:04:37 networkhost kernel: [35668.049119] vmbr0: port 20(tap112i0) entered forwarding state
  1234. Feb 8 18:04:40 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:00006132:0036595D:56B91F08:vncproxy:113:root@pam:
  1235. Feb 8 18:04:40 networkhost kernel: [35671.158575] kvm: zapping shadow pages for mmio generation wraparound
  1236. Feb 8 18:04:40 networkhost kernel: [35671.158989] kvm: zapping shadow pages for mmio generation wraparound
  1237. Feb 8 18:04:41 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:00006137:003659AC:56B91F09:qmstart:113:root@pam:
  1238. Feb 8 18:04:42 networkhost kernel: [35672.312909] device tap113i0 entered promiscuous mode
  1239. Feb 8 18:04:42 networkhost kernel: [35672.324257] vmbr0: port 21(tap113i0) entered forwarding state
  1240. Feb 8 18:04:42 networkhost kernel: [35672.324829] vmbr0: port 21(tap113i0) entered forwarding state
  1241. Feb 8 18:04:43 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006156:00365A5B:56B91F0B:vncproxy:120:root@pam:
  1242. Feb 8 18:04:44 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:0000615A:00365AB4:56B91F0C:qmstart:120:root@pam:
  1243. Feb 8 18:04:44 networkhost kernel: [35674.816295] device tap120i0 entered promiscuous mode
  1244. Feb 8 18:04:44 networkhost kernel: [35674.827753] vmbr0: port 22(tap120i0) entered forwarding state
  1245. Feb 8 18:04:44 networkhost kernel: [35674.828343] vmbr0: port 22(tap120i0) entered forwarding state
  1246. Feb 8 18:04:45 networkhost kernel: [35675.328116] kvm: zapping shadow pages for mmio generation wraparound
  1247. Feb 8 18:04:45 networkhost kernel: [35675.328546] kvm: zapping shadow pages for mmio generation wraparound
  1248. Feb 8 18:04:46 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006173:00365B79:56B91F0E:vncproxy:123:root@pam:
  1249. Feb 8 18:04:47 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006177:00365C02:56B91F0F:qmstart:123:root@pam:
  1250. Feb 8 18:04:47 networkhost kernel: [35677.945980] kvm: zapping shadow pages for mmio generation wraparound
  1251. Feb 8 18:04:47 networkhost kernel: [35677.946396] kvm: zapping shadow pages for mmio generation wraparound
  1252. Feb 8 18:04:48 networkhost kernel: [35678.224896] device tap123i0 entered promiscuous mode
  1253. Feb 8 18:04:48 networkhost kernel: [35678.236981] vmbr0: port 23(tap123i0) entered forwarding state
  1254. Feb 8 18:04:48 networkhost kernel: [35678.237543] vmbr0: port 23(tap123i0) entered forwarding state
  1255. Feb 8 18:04:51 networkhost kernel: [35681.469787] kvm: zapping shadow pages for mmio generation wraparound
  1256. Feb 8 18:04:51 networkhost kernel: [35681.470209] kvm: zapping shadow pages for mmio generation wraparound
  1257. Feb 8 18:04:58 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006199:0036605E:56B91F1A:vncproxy:110:root@pam:
  1258. Feb 8 18:06:39 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:0000624D:003687AF:56B91F7F:vncproxy:114:root@pam:
  1259. Feb 8 18:06:58 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:00006260:00368EF6:56B91F92:vncproxy:131:root@pam:
  1260. Feb 8 18:06:58 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006264:00368F45:56B91F92:qmstart:131:root@pam:
  1261. Feb 8 18:06:59 networkhost kernel: [35809.597646] device tap131i0 entered promiscuous mode
  1262. Feb 8 18:06:59 networkhost kernel: [35809.610524] vmbr0: port 24(tap131i0) entered forwarding state
  1263. Feb 8 18:06:59 networkhost kernel: [35809.611442] vmbr0: port 24(tap131i0) entered forwarding state
  1264. Feb 8 18:07:00 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:0000627E:0036900C:56B91F94:vncproxy:107:root@pam:
  1265. Feb 8 18:07:01 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:000062AF:00369074:56B91F95:qmstart:107:root@pam:
  1266. Feb 8 18:07:02 networkhost kernel: [35812.638180] device tap107i0 entered promiscuous mode
  1267. Feb 8 18:07:02 networkhost kernel: [35812.650881] vmbr0: port 25(tap107i0) entered forwarding state
  1268. Feb 8 18:07:02 networkhost kernel: [35812.651456] vmbr0: port 25(tap107i0) entered forwarding state
  1269. Feb 8 18:07:02 networkhost kernel: [35813.348970] kvm: zapping shadow pages for mmio generation wraparound
  1270. Feb 8 18:07:02 networkhost kernel: [35813.349428] kvm: zapping shadow pages for mmio generation wraparound
  1271. Feb 8 18:07:04 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:000062CE:00369160:56B91F98:vncproxy:105:root@pam:
  1272. Feb 8 18:07:04 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:000062D4:0036919A:56B91F98:qmstart:105:root@pam:
  1273. Feb 8 18:07:05 networkhost kernel: [35815.538332] kvm: zapping shadow pages for mmio generation wraparound
  1274. Feb 8 18:07:05 networkhost kernel: [35815.538729] kvm: zapping shadow pages for mmio generation wraparound
  1275. Feb 8 18:07:05 networkhost kernel: [35815.574824] device tap105i0 entered promiscuous mode
  1276. Feb 8 18:07:05 networkhost kernel: [35815.587772] vmbr0: port 26(tap105i0) entered forwarding state
  1277. Feb 8 18:07:05 networkhost kernel: [35815.588346] vmbr0: port 26(tap105i0) entered forwarding state
  1278. Feb 8 18:07:07 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:000062EC:0036927A:56B91F9B:vncproxy:106:root@pam:
  1279. Feb 8 18:07:08 networkhost kernel: [35818.832814] kvm: zapping shadow pages for mmio generation wraparound
  1280. Feb 8 18:07:08 networkhost kernel: [35818.833342] kvm: zapping shadow pages for mmio generation wraparound
  1281. Feb 8 18:07:08 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:000062F0:0036931A:56B91F9C:qmstart:106:root@pam:
  1282. Feb 8 18:07:09 networkhost kernel: [35819.424918] device tap106i0 entered promiscuous mode
  1283. Feb 8 18:07:09 networkhost kernel: [35819.438524] vmbr0: port 27(tap106i0) entered forwarding state
  1284. Feb 8 18:07:09 networkhost kernel: [35819.439130] vmbr0: port 27(tap106i0) entered forwarding state
  1285. Feb 8 18:07:10 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:0000630A:003693F0:56B91F9E:vncproxy:104:root@pam:
  1286. Feb 8 18:07:11 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:0000630E:00369425:56B91F9F:qmstart:104:root@pam:
  1287. Feb 8 18:07:11 networkhost kernel: [35822.101709] device tap104i0 entered promiscuous mode
  1288. Feb 8 18:07:11 networkhost kernel: [35822.115395] vmbr0: port 28(tap104i0) entered forwarding state
  1289. Feb 8 18:07:11 networkhost kernel: [35822.115971] vmbr0: port 28(tap104i0) entered forwarding state
  1290. Feb 8 18:07:12 networkhost kernel: [35822.581010] kvm: zapping shadow pages for mmio generation wraparound
  1291. Feb 8 18:07:12 networkhost kernel: [35822.581399] kvm: zapping shadow pages for mmio generation wraparound
  1292. Feb 8 18:07:13 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:0000632C:00369502:56B91FA1:vncproxy:103:root@pam:
  1293. Feb 8 18:07:14 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006330:0036955D:56B91FA2:qmstart:103:root@pam:
  1294. Feb 8 18:07:14 networkhost kernel: [35825.173447] kvm: zapping shadow pages for mmio generation wraparound
  1295. Feb 8 18:07:14 networkhost kernel: [35825.173912] kvm: zapping shadow pages for mmio generation wraparound
  1296. Feb 8 18:07:14 networkhost kernel: [35825.248018] device tap103i0 entered promiscuous mode
  1297. Feb 8 18:07:14 networkhost kernel: [35825.264674] vmbr0: port 29(tap103i0) entered forwarding state
  1298. Feb 8 18:07:14 networkhost kernel: [35825.265650] vmbr0: port 29(tap103i0) entered forwarding state
  1299. Feb 8 18:07:16 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:0000634A:00369637:56B91FA4:vncproxy:102:root@pam:
  1300. Feb 8 18:07:17 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:0000634E:0036966E:56B91FA5:qmstart:102:root@pam:
  1301. Feb 8 18:07:17 networkhost kernel: [35828.082915] device tap102i0 entered promiscuous mode
  1302. Feb 8 18:07:17 networkhost kernel: [35828.098446] vmbr0: port 30(tap102i0) entered forwarding state
  1303. Feb 8 18:07:17 networkhost kernel: [35828.099307] vmbr0: port 30(tap102i0) entered forwarding state
  1304. Feb 8 18:07:18 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006366:00369718:56B91FA6:vncproxy:101:root@pam:
  1305. Feb 8 18:07:18 networkhost kernel: [35829.347834] kvm: zapping shadow pages for mmio generation wraparound
  1306. Feb 8 18:07:18 networkhost kernel: [35829.348520] kvm: zapping shadow pages for mmio generation wraparound
  1307. Feb 8 18:07:20 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:0000636A:0036978C:56B91FA8:qmstart:101:root@pam:
  1308. Feb 8 18:07:20 networkhost kernel: [35830.962094] device tap101i0 entered promiscuous mode
  1309. Feb 8 18:07:20 networkhost kernel: [35830.977579] vmbr0: port 31(tap101i0) entered forwarding state
  1310. Feb 8 18:07:20 networkhost kernel: [35830.978082] vmbr0: port 31(tap101i0) entered forwarding state
  1311. Feb 8 18:07:21 networkhost kernel: [35831.841662] kvm: zapping shadow pages for mmio generation wraparound
  1312. Feb 8 18:07:21 networkhost kernel: [35831.842122] kvm: zapping shadow pages for mmio generation wraparound
  1313. Feb 8 18:07:22 networkhost pvedaemon[24319]: <root@pam> starting task UPID:networkhost:00006388:003698AA:56B91FAA:vncproxy:112:root@pam:
  1314. Feb 8 18:07:24 networkhost kernel: [35834.501261] kvm: zapping shadow pages for mmio generation wraparound
  1315. Feb 8 18:07:24 networkhost kernel: [35834.502211] kvm: zapping shadow pages for mmio generation wraparound
  1316. Feb 8 18:07:25 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:0000638E:00369978:56B91FAC:vncproxy:100:root@pam:
  1317. Feb 8 18:07:25 networkhost pvedaemon[24329]: <root@pam> starting task UPID:networkhost:00006392:003699B8:56B91FAD:qmstart:100:root@pam:
  1318. Feb 8 18:07:26 networkhost kernel: [35836.566497] device tap100i0 entered promiscuous mode
  1319. Feb 8 18:07:26 networkhost kernel: [35836.582331] vmbr0: port 32(tap100i0) entered forwarding state
  1320. Feb 8 18:07:26 networkhost kernel: [35836.583087] vmbr0: port 32(tap100i0) entered forwarding state
  1321. Feb 8 18:07:30 networkhost kernel: [35840.539408] kvm: zapping shadow pages for mmio generation wraparound
  1322. Feb 8 18:07:30 networkhost kernel: [35840.539967] kvm: zapping shadow pages for mmio generation wraparound
  1323. Feb 8 18:07:33 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:000063BC:00369C9B:56B91FB5:vncproxy:114:root@pam:
  1324. Feb 8 18:09:27 networkhost pvedaemon[24337]: <root@pam> starting task UPID:networkhost:0000648F:0036C954:56B92027:vncproxy:115:root@pam:
  1325. Feb 8 18:11:15 networkhost pvedaemon[25655]: <root@pam> successful auth for user 'root@pam'
  1326. Feb 8 18:11:23 networkhost pvedaemon[25655]: <root@pam> starting task UPID:networkhost:00006564:0036F68C:56B9209B:vncproxy:116:root@pam:
  1327. Feb 8 18:16:13 networkhost pvedaemon[25655]: <root@pam> starting task UPID:networkhost:00006776:003767E4:56B921BD:vncproxy:117:root@pam:
  1328. Feb 8 18:17:40 networkhost pvedaemon[26598]: <root@pam> starting task UPID:networkhost:000067FE:003789D4:56B92214:vncproxy:119:root@pam:
  1329. Feb 8 18:17:41 networkhost pvedaemon[26521]: <root@pam> starting task UPID:networkhost:00006805:00378A5A:56B92215:vncproxy:118:root@pam:
  1330. Feb 8 18:18:47 networkhost pvedaemon[26598]: <root@pam> starting task UPID:networkhost:00006876:0037A3FF:56B92257:vncproxy:110:root@pam:
  1331. Feb 8 18:18:48 networkhost pvedaemon[25868]: <root@pam> starting task UPID:networkhost:0000687A:0037A484:56B92258:vncproxy:108:root@pam:
  1332. Feb 8 18:24:40 networkhost pvedaemon[26521]: <root@pam> starting task UPID:networkhost:00006AE0:00382E1E:56B923B8:vncproxy:116:root@pam:
  1333. Feb 8 18:24:48 networkhost pvedaemon[26521]: <root@pam> starting task UPID:networkhost:00006AEE:003830F5:56B923C0:vncproxy:117:root@pam:
  1334. Feb 8 18:24:55 networkhost pvedaemon[27330]: <root@pam> starting task UPID:networkhost:00006AF9:003833F8:56B923C7:vncproxy:118:root@pam:
  1335. Feb 8 18:26:15 networkhost pvedaemon[27460]: <root@pam> successful auth for user 'root@pam'
  1336. Feb 8 18:39:09 networkhost pvedaemon[28652]: <root@pam> starting task UPID:networkhost:000070FA:0039816E:56B9271D:vncproxy:118:root@pam:
  1337. Feb 8 18:39:17 networkhost pvedaemon[28753]: <root@pam> starting task UPID:networkhost:0000710A:0039849F:56B92725:vncproxy:108:root@pam:
  1338. Feb 8 18:39:26 networkhost pvedaemon[28652]: <root@pam> starting task UPID:networkhost:0000711F:0039881B:56B9272E:vncproxy:110:root@pam:
  1339. Feb 8 18:40:10 networkhost pvedaemon[28753]: <root@pam> starting task UPID:networkhost:00007178:00399917:56B9275A:vncproxy:121:root@pam:
  1340. Feb 8 18:41:15 networkhost pvedaemon[28753]: <root@pam> successful auth for user 'root@pam'
  1341. Feb 8 18:41:42 networkhost pvedaemon[28652]: <root@pam> starting task UPID:networkhost:00007211:0039BD26:56B927B6:vncproxy:122:root@pam:
  1342. Feb 8 18:43:56 networkhost pvedaemon[28753]: <root@pam> starting task UPID:networkhost:000072F9:0039F15C:56B9283C:vncproxy:125:root@pam:
  1343. Feb 8 18:45:39 networkhost pvedaemon[29607]: <root@pam> starting task UPID:networkhost:000073C8:003A19CE:56B928A3:vncproxy:127:root@pam:
  1344. Feb 8 18:46:25 networkhost pvedaemon[29609]: <root@pam> starting task UPID:networkhost:00007421:003A2BA4:56B928D1:vncproxy:128:root@pam:
  1345. Feb 8 18:47:53 networkhost pvedaemon[29609]: <root@pam> starting task UPID:networkhost:000074B7:003A4E19:56B92929:vncproxy:129:root@pam:
  1346. Feb 8 18:49:01 networkhost pvedaemon[29609]: <root@pam> starting task UPID:networkhost:00007536:003A6886:56B9296D:vncproxy:130:root@pam:
  1347. Feb 8 18:49:59 networkhost pvedaemon[29607]: <root@pam> starting task UPID:networkhost:000075AE:003A7F2C:56B929A7:vncproxy:119:root@pam:
  1348. Feb 8 18:51:03 networkhost pvedaemon[30214]: <root@pam> starting task UPID:networkhost:00007665:003A9848:56B929E7:vncproxy:110:root@pam:
  1349. Feb 8 18:53:09 networkhost pvedaemon[30477]: <root@pam> starting task UPID:networkhost:00007786:003AC99B:56B92A65:vncproxy:121:root@pam:
  1350. Feb 8 18:56:15 networkhost pvedaemon[30477]: <root@pam> successful auth for user 'root@pam'
  1351. Feb 8 19:05:26 networkhost pvedaemon[31359]: <root@pam> starting task UPID:networkhost:00007CF8:003BE967:56B92D46:vncproxy:109:root@pam:
  1352. Feb 8 19:05:32 networkhost pvedaemon[31084]: <root@pam> starting task UPID:networkhost:00007D09:003BEBB9:56B92D4C:vncproxy:109:root@pam:
  1353. Feb 8 19:05:46 networkhost pvedaemon[31084]: <root@pam> starting task UPID:networkhost:00007D1E:003BF149:56B92D5A:vncproxy:126:root@pam:
  1354. Feb 8 19:10:37 networkhost pvedaemon[32445]: <root@pam> successful auth for user 'osiemexit@gmail.com@pve'
  1355. Feb 8 19:10:48 networkhost pvedaemon[32110]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00007F4F:003C672B:56B92E88:vncproxy:109:osiemexit@gmail.com@pve:
  1356. Feb 8 19:10:56 networkhost pvedaemon[32110]: <root@pam> starting task UPID:networkhost:00007F5F:003C6A4D:56B92E90:vncproxy:108:root@pam:
  1357. Feb 8 19:11:15 networkhost pvedaemon[32109]: <root@pam> successful auth for user 'root@pam'
  1358. Feb 8 19:12:10 networkhost pvedaemon[32445]: <root@pam> update VM 108: -delete vcpus -cpuunits 500 -cpulimit 1
  1359. Feb 8 19:12:16 networkhost pvedaemon[32110]: <root@pam> starting task UPID:networkhost:0000013C:003C899F:56B92EE0:vncproxy:108:root@pam:
  1360. Feb 8 19:12:17 networkhost pvedaemon[32445]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:00000141:003C89DA:56B92EE1:vncproxy:126:osiemexit@gmail.com@pve:
  1361. Feb 8 19:13:12 networkhost pvedaemon[345]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:000001C0:003C9F59:56B92F18:vncproxy:109:osiemexit@gmail.com@pve:
  1362. Feb 8 19:13:38 networkhost pvedaemon[32445]: <root@pam> update VM 108: -protection 1
  1363. Feb 8 19:13:44 networkhost pvedaemon[32445]: <root@pam> update VM 108: -delete protection
  1364. Feb 8 19:14:10 networkhost pvedaemon[345]: <root@pam> update VM 108: -delete cpulimit,cpuunits -vcpus 1
  1365. Feb 8 19:14:17 networkhost pvedaemon[388]: <root@pam> starting task UPID:networkhost:00000241:003CB8D2:56B92F59:qmshutdown:108:root@pam:
  1366. Feb 8 19:14:20 networkhost kernel: [39856.920633] vmbr0: port 2(tap108i0) entered disabled state
  1367. Feb 8 19:14:23 networkhost pvedaemon[388]: <root@pam> starting task UPID:networkhost:000002A9:003CBB17:56B92F5F:qmstart:108:root@pam:
  1368. Feb 8 19:14:23 networkhost kernel: [39859.934055] device tap108i0 entered promiscuous mode
  1369. Feb 8 19:14:23 networkhost kernel: [39859.949596] vmbr0: port 2(tap108i0) entered forwarding state
  1370. Feb 8 19:14:23 networkhost kernel: [39859.949992] vmbr0: port 2(tap108i0) entered forwarding state
  1371. Feb 8 19:14:26 networkhost kernel: [39863.148161] kvm: zapping shadow pages for mmio generation wraparound
  1372. Feb 8 19:14:26 networkhost kernel: [39863.148879] kvm: zapping shadow pages for mmio generation wraparound
  1373. Feb 8 19:14:31 networkhost pvedaemon[388]: <root@pam> update VM 108: -delete cpu -sockets 1 -cores 1 -numa 1
  1374. Feb 8 19:14:52 networkhost pvedaemon[345]: <root@pam> update VM 108: -revert sockets,cpu,cores,numa,vcpus,cpulimit,cpuunits
  1375. Feb 8 19:14:56 networkhost pvedaemon[567]: <root@pam> starting task UPID:networkhost:000002E3:003CC7FE:56B92F80:vncproxy:108:root@pam:
  1376. Feb 8 19:15:20 networkhost pvedaemon[388]: <root@pam> starting task UPID:networkhost:0000032A:003CD19A:56B92F98:vncproxy:108:root@pam:
  1377. Feb 8 19:26:16 networkhost pvedaemon[1425]: <root@pam> successful auth for user 'root@pam'
  1378. Feb 8 20:22:43 networkhost pvedaemon[2887]: <root@pam> successful auth for user 'osiemexit@gmail.com@pve'
  1379. Feb 8 20:22:58 networkhost pvedaemon[3031]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:0000213E:00430282:56B93F72:vncproxy:109:osiemexit@gmail.com@pve:
  1380. Feb 8 20:23:14 networkhost pvedaemon[2887]: <osiemexit@gmail.com@pve> starting task UPID:networkhost:0000217C:004308BF:56B93F82:vncproxy:126:osiemexit@gmail.com@pve:
  1381. Feb 8 20:56:49 networkhost pvedaemon[2969]: <root@pam> successful auth for user 'root@pam'
  1382. Feb 8 20:59:01 networkhost pvedaemon[2969]: <root@pam> starting task UPID:networkhost:00003114:00464F9A:56B947E5:vncproxy:114:root@pam:
  1383. Feb 8 21:06:34 networkhost pvedaemon[13134]: <root@pam> starting task UPID:networkhost:00003440:004700A0:56B949AA:vncproxy:110:root@pam:
  1384. Feb 8 21:11:48 networkhost pvedaemon[13496]: <root@pam> successful auth for user 'root@pam'
  1385. Feb 8 21:26:48 networkhost pvedaemon[15194]: <root@pam> successful auth for user 'root@pam'
  1386. Feb 8 21:41:49 networkhost pvedaemon[17177]: <root@pam> successful auth for user 'root@pam'
  1387. Feb 8 21:56:50 networkhost pvedaemon[17991]: <root@pam> successful auth for user 'root@pam'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement