Advertisement
VecH

Untitled

Jul 22nd, 2018
203
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.87 KB | None | 0 0
  1. Jul 22 14:08:28 pve kernel: [ 7842.487601] device tap102i0 entered promiscuous mode
  2. Jul 22 14:08:28 pve kernel: [ 7842.494689] vmbr0: port 2(tap102i0) entered blocking state
  3. Jul 22 14:08:28 pve kernel: [ 7842.494690] vmbr0: port 2(tap102i0) entered disabled state
  4. Jul 22 14:08:28 pve kernel: [ 7842.494751] vmbr0: port 2(tap102i0) entered blocking state
  5. Jul 22 14:08:28 pve kernel: [ 7842.494752] vmbr0: port 2(tap102i0) entered forwarding state
  6. Jul 22 14:08:29 pve pvedaemon[4539]: <root@pam> end task UPID:pve:00001719:000BF735:5B54114B:qmstart:102:root@pam: OK
  7. Jul 22 14:08:31 pve pvedaemon[4540]: <root@pam> starting task UPID:pve:00001779:000BF88B:5B54114F:vncproxy:102:root@pam:
  8. Jul 22 14:08:37 pve pvedaemon[4538]: <root@pam> starting task UPID:pve:00001F3D:000BFB05:5B541155:qmstop:102:root@pam:
  9. Jul 22 14:08:37 pve kernel: [ 7851.593358] sdc: sdc1 sdc2
  10. Jul 22 14:08:37 pve kernel: [ 7851.691936] vmbr0: port 2(tap102i0) entered disabled state
  11. Jul 22 14:08:38 pve pvedaemon[4540]: <root@pam> end task UPID:pve:00001779:000BF88B:5B54114F:vncproxy:102:root@pam: OK
  12. Jul 22 14:08:38 pve pvedaemon[4539]: <root@pam> starting task UPID:pve:00001F56:000BFB50:5B541156:vncproxy:102:root@pam:
  13. Jul 22 14:08:38 pve pvedaemon[4538]: <root@pam> end task UPID:pve:00001F3D:000BFB05:5B541155:qmstop:102:root@pam: OK
  14. Jul 22 14:08:38 pve pvedaemon[4539]: <root@pam> end task UPID:pve:00001F56:000BFB50:5B541156:vncproxy:102:root@pam: Failed to run vncproxy.
  15. Jul 22 14:08:41 pve pvedaemon[4538]: <root@pam> starting task UPID:pve:00001F66:000BFC52:5B541159:qmstart:102:root@pam:
  16. Jul 22 14:08:41 pve kernel: [ 7855.199329] device tap102i0 entered promiscuous mode
  17. Jul 22 14:08:41 pve kernel: [ 7855.206448] vmbr0: port 2(tap102i0) entered blocking state
  18. Jul 22 14:08:41 pve kernel: [ 7855.206450] vmbr0: port 2(tap102i0) entered disabled state
  19. Jul 22 14:08:41 pve kernel: [ 7855.206510] vmbr0: port 2(tap102i0) entered blocking state
  20. Jul 22 14:08:41 pve kernel: [ 7855.206511] vmbr0: port 2(tap102i0) entered forwarding state
  21. Jul 22 14:08:41 pve pvedaemon[4538]: <root@pam> end task UPID:pve:00001F66:000BFC52:5B541159:qmstart:102:root@pam: OK
  22. Jul 22 14:08:42 pve pvedaemon[4538]: <root@pam> starting task UPID:pve:00002019:000BFCD0:5B54115A:vncproxy:102:root@pam:
  23. Jul 22 14:15:52 pve kernel: [ 0.000000] Linux version 4.15.17-3-pve (tlamprecht@evita) (gcc version 6.3.0 20170516 (Debian 6.3.0-18+deb9u1)) #1 SMP PVE 4.15.17-14 (Wed, 27 Jun 2018 17:18:05 +0200) ()
  24. Jul 22 14:15:52 pve kernel: [ 0.000000] Command line: BOOT_IMAGE=/ROOT/pve-1@/boot/vmlinuz-4.15.17-3-pve root=ZFS=rpool/ROOT/pve-1 ro root=ZFS=rpool/ROOT/pve-1 boot=zfs quiet vga=795
  25. Jul 22 14:15:52 pve kernel: [ 0.000000] KERNEL supported cpus:
  26. Jul 22 14:15:52 pve kernel: [ 0.000000] Intel GenuineIntel
  27. Jul 22 14:15:52 pve kernel: [ 0.000000] AMD AuthenticAMD
  28. Jul 22 14:15:52 pve kernel: [ 0.000000] Centaur CentaurHauls
  29. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
  30. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
  31. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
  32. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
  33. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
  34. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
  35. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64
  36. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64
  37. Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format.
  38. Jul 22 14:15:52 pve kernel: [ 0.000000] e820: BIOS-provided physical RAM map:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement