Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jul 22 14:08:28 pve kernel: [ 7842.487601] device tap102i0 entered promiscuous mode
- Jul 22 14:08:28 pve kernel: [ 7842.494689] vmbr0: port 2(tap102i0) entered blocking state
- Jul 22 14:08:28 pve kernel: [ 7842.494690] vmbr0: port 2(tap102i0) entered disabled state
- Jul 22 14:08:28 pve kernel: [ 7842.494751] vmbr0: port 2(tap102i0) entered blocking state
- Jul 22 14:08:28 pve kernel: [ 7842.494752] vmbr0: port 2(tap102i0) entered forwarding state
- Jul 22 14:08:29 pve pvedaemon[4539]: <root@pam> end task UPID:pve:00001719:000BF735:5B54114B:qmstart:102:root@pam: OK
- Jul 22 14:08:31 pve pvedaemon[4540]: <root@pam> starting task UPID:pve:00001779:000BF88B:5B54114F:vncproxy:102:root@pam:
- Jul 22 14:08:37 pve pvedaemon[4538]: <root@pam> starting task UPID:pve:00001F3D:000BFB05:5B541155:qmstop:102:root@pam:
- Jul 22 14:08:37 pve kernel: [ 7851.593358] sdc: sdc1 sdc2
- Jul 22 14:08:37 pve kernel: [ 7851.691936] vmbr0: port 2(tap102i0) entered disabled state
- Jul 22 14:08:38 pve pvedaemon[4540]: <root@pam> end task UPID:pve:00001779:000BF88B:5B54114F:vncproxy:102:root@pam: OK
- Jul 22 14:08:38 pve pvedaemon[4539]: <root@pam> starting task UPID:pve:00001F56:000BFB50:5B541156:vncproxy:102:root@pam:
- Jul 22 14:08:38 pve pvedaemon[4538]: <root@pam> end task UPID:pve:00001F3D:000BFB05:5B541155:qmstop:102:root@pam: OK
- Jul 22 14:08:38 pve pvedaemon[4539]: <root@pam> end task UPID:pve:00001F56:000BFB50:5B541156:vncproxy:102:root@pam: Failed to run vncproxy.
- Jul 22 14:08:41 pve pvedaemon[4538]: <root@pam> starting task UPID:pve:00001F66:000BFC52:5B541159:qmstart:102:root@pam:
- Jul 22 14:08:41 pve kernel: [ 7855.199329] device tap102i0 entered promiscuous mode
- Jul 22 14:08:41 pve kernel: [ 7855.206448] vmbr0: port 2(tap102i0) entered blocking state
- Jul 22 14:08:41 pve kernel: [ 7855.206450] vmbr0: port 2(tap102i0) entered disabled state
- Jul 22 14:08:41 pve kernel: [ 7855.206510] vmbr0: port 2(tap102i0) entered blocking state
- Jul 22 14:08:41 pve kernel: [ 7855.206511] vmbr0: port 2(tap102i0) entered forwarding state
- Jul 22 14:08:41 pve pvedaemon[4538]: <root@pam> end task UPID:pve:00001F66:000BFC52:5B541159:qmstart:102:root@pam: OK
- Jul 22 14:08:42 pve pvedaemon[4538]: <root@pam> starting task UPID:pve:00002019:000BFCD0:5B54115A:vncproxy:102:root@pam:
- Jul 22 14:15:52 pve kernel: [ 0.000000] Linux version 4.15.17-3-pve (tlamprecht@evita) (gcc version 6.3.0 20170516 (Debian 6.3.0-18+deb9u1)) #1 SMP PVE 4.15.17-14 (Wed, 27 Jun 2018 17:18:05 +0200) ()
- Jul 22 14:15:52 pve kernel: [ 0.000000] Command line: BOOT_IMAGE=/ROOT/pve-1@/boot/vmlinuz-4.15.17-3-pve root=ZFS=rpool/ROOT/pve-1 ro root=ZFS=rpool/ROOT/pve-1 boot=zfs quiet vga=795
- Jul 22 14:15:52 pve kernel: [ 0.000000] KERNEL supported cpus:
- Jul 22 14:15:52 pve kernel: [ 0.000000] Intel GenuineIntel
- Jul 22 14:15:52 pve kernel: [ 0.000000] AMD AuthenticAMD
- Jul 22 14:15:52 pve kernel: [ 0.000000] Centaur CentaurHauls
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64
- Jul 22 14:15:52 pve kernel: [ 0.000000] x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format.
- Jul 22 14:15:52 pve kernel: [ 0.000000] e820: BIOS-provided physical RAM map:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement