dmesg - 2 x Intel Xeon E5-2695 v4 - - DigitalOcean Droplet

Return To 2 x Intel Xeon E5-2695 v4 - - DigitalOcean Droplet System Information

Initializing cgroup subsys cpuset
Initializing cgroup subsys cpu
Initializing cgroup subsys cpuacct
Linux version 4.4.0-66-generic (buildd@lgw01-28) (gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.4) ) #87-Ubuntu SMP Fri Mar 3 15:29:05 UTC 2017 (Ubuntu 4.4.0-66.87-generic 4.4.44)
Command line: BOOT_IMAGE=/boot/vmlinuz-4.4.0-66-generic root=LABEL=cloudimg-rootfs ro console=tty1 console=ttyS0
KERNEL supported cpus:
  Intel GenuineIntel
  AMD AuthenticAMD
  Centaur CentaurHauls
x86/fpu: xstate_offset[2]:  576, xstate_sizes[2]:  256
x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
x86/fpu: Using 'eager' FPU context switches.
e820: BIOS-provided physical RAM map:
BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable
BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved
BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved
BIOS-e820: [mem 0x0000000000100000-0x000000007fffdfff] usable
BIOS-e820: [mem 0x000000007fffe000-0x000000007fffffff] reserved
BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved
BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved
NX (Execute Disable) protection: active
SMBIOS 2.4 present.
DMI: DigitalOcean Droplet, BIOS 20161103 11/03/2016
Hypervisor detected: KVM
e820: update [mem 0x00000000-0x00000fff] usable ==> reserved
e820: remove [mem 0x000a0000-0x000fffff] usable
e820: last_pfn = 0x7fffe max_arch_pfn = 0x400000000
MTRR default type: write-back
MTRR fixed ranges enabled:
  00000-9FFFF write-back
  A0000-BFFFF uncachable
  C0000-FFFFF write-protect
MTRR variable ranges enabled:
  0 base 0080000000 mask FF80000000 uncachable
  1 disabled
  2 disabled
  3 disabled
  4 disabled
  5 disabled
  6 disabled
  7 disabled
x86/PAT: Configuration [0-7]: WB  WC  UC- UC  WB  WC  UC- WT  
found SMP MP-table at [mem 0x000f1770-0x000f177f] mapped at [ffff8800000f1770]
Scanning 1 areas for low memory corruption
Base memory trampoline at [ffff880000099000] 99000 size 24576
Using GB pages for direct mapping
BRK [0x0220c000, 0x0220cfff] PGTABLE
BRK [0x0220d000, 0x0220dfff] PGTABLE
BRK [0x0220e000, 0x0220efff] PGTABLE
BRK [0x0220f000, 0x0220ffff] PGTABLE
BRK [0x02210000, 0x02210fff] PGTABLE
RAMDISK: [mem 0x36ad0000-0x3755ffff]
ACPI: Early table checksum verification disabled
ACPI: RSDP 0x00000000000F15C0 000014 (v00 BOCHS )
ACPI: RSDT 0x000000007FFFE410 000034 (v01 BOCHS  BXPCRSDT 00000001 BXPC 00000001)
ACPI: FACP 0x000000007FFFFF80 000074 (v01 BOCHS  BXPCFACP 00000001 BXPC 00000001)
ACPI: DSDT 0x000000007FFFE450 001135 (v01 BOCHS  BXPCDSDT 00000001 BXPC 00000001)
ACPI: FACS 0x000000007FFFFF40 000040
ACPI: SSDT 0x000000007FFFF6C0 00087A (v01 BOCHS  BXPCSSDT 00000001 BXPC 00000001)
ACPI: APIC 0x000000007FFFF5D0 000080 (v01 BOCHS  BXPCAPIC 00000001 BXPC 00000001)
ACPI: HPET 0x000000007FFFF590 000038 (v01 BOCHS  BXPCHPET 00000001 BXPC 00000001)
ACPI: Local APIC address 0xfee00000
No NUMA configuration found
Faking a node at [mem 0x0000000000000000-0x000000007fffdfff]
NODE_DATA(0) allocated [mem 0x7fff9000-0x7fffdfff]
kvm-clock: Using msrs 4b564d01 and 4b564d00
kvm-clock: cpu 0, msr 0:7fff1001, primary cpu clock
clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns
Zone ranges:
  DMA      [mem 0x0000000000001000-0x0000000000ffffff]
  DMA32    [mem 0x0000000001000000-0x000000007fffdfff]
  Normal   empty
  Device   empty
Movable zone start for each node
Early memory node ranges
  node   0: [mem 0x0000000000001000-0x000000000009efff]
  node   0: [mem 0x0000000000100000-0x000000007fffdfff]
Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffdfff]
On node 0 totalpages: 524188
  DMA zone: 64 pages used for memmap
  DMA zone: 21 pages reserved
  DMA zone: 3998 pages, LIFO batch:0
  DMA32 zone: 8128 pages used for memmap
  DMA32 zone: 520190 pages, LIFO batch:31
ACPI: PM-Timer IO Port: 0xb008
ACPI: Local APIC address 0xfee00000
ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1])
IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23
ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl)
ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level)
ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level)
ACPI: IRQ0 used by override.
ACPI: IRQ5 used by override.
ACPI: IRQ9 used by override.
ACPI: IRQ10 used by override.
ACPI: IRQ11 used by override.
Using ACPI (MADT) for SMP configuration information
ACPI: HPET id: 0x8086a201 base: 0xfed00000
smpboot: Allowing 2 CPUs, 0 hotplug CPUs
PM: Registered nosave memory: [mem 0x00000000-0x00000fff]
PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff]
PM: Registered nosave memory: [mem 0x000a0000-0x000effff]
PM: Registered nosave memory: [mem 0x000f0000-0x000fffff]
e820: [mem 0x80000000-0xfeffbfff] available for PCI devices
Booting paravirtualized kernel on KVM
clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645519600211568 ns
setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1
PERCPU: Embedded 33 pages/cpu @ffff88007fc00000 s98264 r8192 d28712 u1048576
pcpu-alloc: s98264 r8192 d28712 u1048576 alloc=1*2097152
pcpu-alloc: [0] 0 1 
KVM setup async PF for cpu 0
kvm-stealtime: cpu 0, msr 7fc0d9c0
PV qspinlock hash table entries: 256 (order: 0, 4096 bytes)
Built 1 zonelists in Node order, mobility grouping on.  Total pages: 515975
Policy zone: DMA32
Kernel command line: BOOT_IMAGE=/boot/vmlinuz-4.4.0-66-generic root=LABEL=cloudimg-rootfs ro console=tty1 console=ttyS0
PID hash table entries: 4096 (order: 3, 32768 bytes)
Calgary: detecting Calgary via BIOS EBDA area
Calgary: Unable to locate Rio Grande table in EBDA - bailing!
Memory: 2034008K/2096752K available (8452K kernel code, 1293K rwdata, 3980K rodata, 1488K init, 1316K bss, 62744K reserved, 0K cma-reserved)
SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
Hierarchical RCU implementation.
	Build-time adjustment of leaf fanout to 64.
	RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2.
RCU: Adjusting geometry for rcu_fanout_leaf=64, nr_cpu_ids=2
NR_IRQS:33024 nr_irqs:440 16
Console: colour VGA+ 80x25
console [tty1] enabled
console [ttyS0] enabled
clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns
hpet clockevent registered
tsc: Detected 2099.998 MHz processor
Calibrating delay loop (skipped) preset value.. 4199.99 BogoMIPS (lpj=8399992)
pid_max: default: 32768 minimum: 301
ACPI: Core revision 20150930
ACPI: 2 ACPI AML tables successfully acquired and loaded
Security Framework initialized
Yama: becoming mindful.
AppArmor: AppArmor initialized
Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes)
Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes)
Mount-cache hash table entries: 4096 (order: 3, 32768 bytes)
Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes)
Initializing cgroup subsys io
Initializing cgroup subsys memory
Initializing cgroup subsys devices
Initializing cgroup subsys freezer
Initializing cgroup subsys net_cls
Initializing cgroup subsys perf_event
Initializing cgroup subsys net_prio
Initializing cgroup subsys hugetlb
Initializing cgroup subsys pids
mce: CPU supports 10 MCE banks
Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8
Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4
Freeing SMP alternatives memory: 32K (ffffffff820b9000 - ffffffff820c1000)
ftrace: allocating 32123 entries in 126 pages
smpboot: APIC(0) Converting physical 0 to logical package 0
smpboot: APIC(1) Converting physical 1 to logical package 1
smpboot: Max logical packages: 2
x2apic enabled
Switched APIC routing to physical x2apic.
..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
TSC deadline timer enabled
smpboot: CPU0: Intel(R) Xeon(R) CPU E5-2695 v4 @ 2.10GHz (family: 0x6, model: 0x4f, stepping: 0x1)
Performance Events: 16-deep LBR, Broadwell events, Intel PMU driver.
... version:                2
... bit width:              48
... generic registers:      4
... value mask:             0000ffffffffffff
... max period:             000000007fffffff
... fixed-purpose events:   3
... event mask:             000000070000000f
KVM setup paravirtual spinlock
x86: Booting SMP configuration:
.... node  #0, CPUs:      #1
kvm-clock: cpu 1, msr 0:7fff1041, secondary cpu clock
KVM setup async PF for cpu 1
x86: Booted up 1 node, 2 CPUs
smpboot: Total of 2 processors activated (8399.99 BogoMIPS)
kvm-stealtime: cpu 1, msr 7fd0d9c0
devtmpfs: initialized
evm: security.selinux
evm: security.SMACK64
evm: security.SMACK64EXEC
evm: security.SMACK64TRANSMUTE
evm: security.SMACK64MMAP
evm: security.ima
evm: security.capability
clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 7645041785100000 ns
pinctrl core: initialized pinctrl subsystem
RTC time:  4:53:23, date: 04/05/17
NET: Registered protocol family 16
cpuidle: using governor ladder
cpuidle: using governor menu
PCCT header not found.
ACPI: bus type PCI registered
acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5
PCI: Using configuration type 1 for base access
ACPI: Added _OSI(Module Device)
ACPI: Added _OSI(Processor Device)
ACPI: Added _OSI(3.0 _SCP Extensions)
ACPI: Added _OSI(Processor Aggregator Device)
ACPI: Interpreter enabled
ACPI: (supports S0 S3 S4 S5)
ACPI: Using IOAPIC for interrupt routing
PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug
ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff])
acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI]
acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM
acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge.
acpiphp: Slot [3] registered
acpiphp: Slot [4] registered
acpiphp: Slot [5] registered
acpiphp: Slot [6] registered
acpiphp: Slot [7] registered
acpiphp: Slot [8] registered
acpiphp: Slot [9] registered
acpiphp: Slot [10] registered
acpiphp: Slot [11] registered
acpiphp: Slot [12] registered
acpiphp: Slot [13] registered
acpiphp: Slot [14] registered
acpiphp: Slot [15] registered
acpiphp: Slot [16] registered
acpiphp: Slot [17] registered
acpiphp: Slot [18] registered
acpiphp: Slot [19] registered
acpiphp: Slot [20] registered
acpiphp: Slot [21] registered
acpiphp: Slot [22] registered
acpiphp: Slot [23] registered
acpiphp: Slot [24] registered
acpiphp: Slot [25] registered
acpiphp: Slot [26] registered
acpiphp: Slot [27] registered
acpiphp: Slot [28] registered
acpiphp: Slot [29] registered
acpiphp: Slot [30] registered
acpiphp: Slot [31] registered
PCI host bridge to bus 0000:00
pci_bus 0000:00: root bus resource [io  0x0000-0x0cf7 window]
pci_bus 0000:00: root bus resource [io  0x0d00-0xffff window]
pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window]
pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window]
pci_bus 0000:00: root bus resource [bus 00-ff]
pci 0000:00:00.0: [8086:1237] type 00 class 0x060000
pci 0000:00:01.0: [8086:7000] type 00 class 0x060100
pci 0000:00:01.1: [8086:7010] type 00 class 0x010180
pci 0000:00:01.1: reg 0x20: [io  0xc120-0xc12f]
pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io  0x01f0-0x01f7]
pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io  0x03f6]
pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io  0x0170-0x0177]
pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io  0x0376]
pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300
pci 0000:00:01.2: reg 0x20: [io  0xc080-0xc09f]
pci 0000:00:01.3: [8086:7113] type 00 class 0x068000
pci 0000:00:01.3: quirk: [io  0xb000-0xb03f] claimed by PIIX4 ACPI
pci 0000:00:01.3: quirk: [io  0xb100-0xb10f] claimed by PIIX4 SMB
pci 0000:00:02.0: [1b36:0100] type 00 class 0x030000
pci 0000:00:02.0: reg 0x10: [mem 0xf8000000-0xfbffffff]
pci 0000:00:02.0: reg 0x14: [mem 0xfc000000-0xfcffffff]
pci 0000:00:02.0: reg 0x18: [mem 0xfd090000-0xfd091fff]
pci 0000:00:02.0: reg 0x1c: [io  0xc0a0-0xc0bf]
pci 0000:00:02.0: reg 0x30: [mem 0xfd080000-0xfd08ffff pref]
pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000
pci 0000:00:03.0: reg 0x10: [io  0xc0c0-0xc0df]
pci 0000:00:03.0: reg 0x14: [mem 0xfd092000-0xfd092fff]
pci 0000:00:03.0: reg 0x30: [mem 0xfd000000-0xfd03ffff pref]
pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000
pci 0000:00:04.0: reg 0x10: [io  0xc0e0-0xc0ff]
pci 0000:00:04.0: reg 0x14: [mem 0xfd093000-0xfd093fff]
pci 0000:00:04.0: reg 0x30: [mem 0xfd040000-0xfd07ffff pref]
pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000
pci 0000:00:05.0: reg 0x10: [io  0xc000-0xc03f]
pci 0000:00:05.0: reg 0x14: [mem 0xfd094000-0xfd094fff]
pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000
pci 0000:00:06.0: reg 0x10: [io  0xc040-0xc07f]
pci 0000:00:06.0: reg 0x14: [mem 0xfd095000-0xfd095fff]
pci 0000:00:07.0: [1af4:1002] type 00 class 0x00ff00
pci 0000:00:07.0: reg 0x10: [io  0xc100-0xc11f]
ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11)
ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11)
ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11)
ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11)
ACPI: PCI Interrupt Link [LNKS] (IRQs *9)
ACPI: Enabled 16 GPEs in block 00 to 0F
vgaarb: setting as boot device: PCI:0000:00:02.0
vgaarb: device added: PCI:0000:00:02.0,decodes=io+mem,owns=io+mem,locks=none
vgaarb: loaded
vgaarb: bridge control possible 0000:00:02.0
SCSI subsystem initialized
libata version 3.00 loaded.
ACPI: bus type USB registered
usbcore: registered new interface driver usbfs
usbcore: registered new interface driver hub
usbcore: registered new device driver usb
PCI: Using ACPI for IRQ routing
PCI: pci_cache_line_size set to 64 bytes
e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff]
e820: reserve RAM buffer [mem 0x7fffe000-0x7fffffff]
NetLabel: Initializing
NetLabel:  domain hash size = 128
NetLabel:  protocols = UNLABELED CIPSOv4
NetLabel:  unlabeled traffic allowed by default
hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0
hpet0: 3 comparators, 64-bit 100.000000 MHz counter
amd_nb: Cannot enumerate AMD northbridges
clocksource: Switched to clocksource kvm-clock
AppArmor: AppArmor Filesystem Enabled
pnp: PnP ACPI init
pnp 00:00: Plug and Play ACPI device, IDs PNP0b00 (active)
pnp 00:01: Plug and Play ACPI device, IDs PNP0303 (active)
pnp 00:02: Plug and Play ACPI device, IDs PNP0f13 (active)
pnp 00:03: [dma 2]
pnp 00:03: Plug and Play ACPI device, IDs PNP0700 (active)
pnp 00:04: Plug and Play ACPI device, IDs PNP0501 (active)
pnp: PnP ACPI: found 5 devices
clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns
pci_bus 0000:00: resource 4 [io  0x0000-0x0cf7 window]
pci_bus 0000:00: resource 5 [io  0x0d00-0xffff window]
pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window]
pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window]
NET: Registered protocol family 2
TCP established hash table entries: 16384 (order: 5, 131072 bytes)
TCP bind hash table entries: 16384 (order: 6, 262144 bytes)
TCP: Hash tables configured (established 16384 bind 16384)
UDP hash table entries: 1024 (order: 3, 32768 bytes)
UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes)
NET: Registered protocol family 1
pci 0000:00:00.0: Limiting direct PCI/PCI transfers
pci 0000:00:01.0: PIIX3: Enabling Passive Release
pci 0000:00:01.0: Activating ISA DMA hang workarounds
ACPI: PCI Interrupt Link [LNKD] enabled at IRQ 11
pci 0000:00:02.0: Video device with shadowed ROM
PCI: CLS 0 bytes, default 64
Trying to unpack rootfs image as initramfs...
Freeing initrd memory: 10816K (ffff880036ad0000 - ffff880037560000)
Scanning for low memory corruption every 60 seconds
futex hash table entries: 512 (order: 3, 32768 bytes)
audit: initializing netlink subsys (disabled)
audit: type=2000 audit(1491368006.253:1): initialized
Initialise system trusted keyring
HugeTLB registered 1 GB page size, pre-allocated 0 pages
HugeTLB registered 2 MB page size, pre-allocated 0 pages
zbud: loaded
VFS: Disk quotas dquot_6.6.0
VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes)
squashfs: version 4.0 (2009/01/31) Phillip Lougher
fuse init (API version 7.23)
Key type big_key registered
Allocating IMA MOK and blacklist keyrings.
Key type asymmetric registered
Asymmetric key parser 'x509' registered
Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249)
io scheduler noop registered
io scheduler deadline registered (default)
io scheduler cfq registered
pci_hotplug: PCI Hot Plug PCI Core version: 0.5
pciehp: PCI Express Hot Plug Controller Driver version: 0.4
intel_idle: does not run on family 6 model 79
input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0
ACPI: Power Button [PWRF]
GHES: HEST is not enabled!
ACPI: PCI Interrupt Link [LNKC] enabled at IRQ 10
virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver
virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver
ACPI: PCI Interrupt Link [LNKA] enabled at IRQ 10
virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver
ACPI: PCI Interrupt Link [LNKB] enabled at IRQ 11
virtio-pci 0000:00:06.0: virtio_pci: leaving for legacy driver
virtio-pci 0000:00:07.0: virtio_pci: leaving for legacy driver
00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A
Linux agpgart interface v0.103
brd: module loaded
loop: module loaded
 vda: vda1
ata_piix 0000:00:01.1: version 2.13
scsi host0: ata_piix
scsi host1: ata_piix
ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14
ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15
libphy: Fixed MDIO Bus: probed
tun: Universal TUN/TAP device driver, 1.6
tun: (C) 1999-2004 Max Krasnyansky 
PPP generic driver version 2.4.2
ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver
ehci-pci: EHCI PCI platform driver
ehci-platform: EHCI generic platform driver
ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver
ohci-pci: OHCI PCI platform driver
ohci-platform: OHCI generic platform driver
uhci_hcd: USB Universal Host Controller Interface driver
uhci_hcd 0000:00:01.2: UHCI Host Controller
uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1
uhci_hcd 0000:00:01.2: detected 2 ports
uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c080
usb usb1: New USB device found, idVendor=1d6b, idProduct=0001
usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1
usb usb1: Product: UHCI Host Controller
usb usb1: Manufacturer: Linux 4.4.0-66-generic uhci_hcd
usb usb1: SerialNumber: 0000:00:01.2
hub 1-0:1.0: USB hub found
hub 1-0:1.0: 2 ports detected
i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12
serio: i8042 KBD port at 0x60,0x64 irq 1
serio: i8042 AUX port at 0x60,0x64 irq 12
mousedev: PS/2 mouse device common for all mice
input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input1
rtc_cmos 00:00: RTC can wake from S4
rtc_cmos 00:00: rtc core: registered rtc_cmos as rtc0
rtc_cmos 00:00: alarms up to one day, 114 bytes nvram, hpet irqs
i2c /dev entries driver
device-mapper: uevent: version 1.0.3
device-mapper: ioctl: 4.34.0-ioctl (2015-10-28) initialised: [email protected]
ledtrig-cpu: registered to indicate activity on CPUs
NET: Registered protocol family 10
NET: Registered protocol family 17
Key type dns_resolver registered
microcode: CPU0 sig=0x406f1, pf=0x1, revision=0x1
microcode: CPU1 sig=0x406f1, pf=0x1, revision=0x1
microcode: Microcode Update Driver: v2.01 , Peter Oruba
registered taskstats version 1
Loading compiled-in X.509 certificates
Loaded X.509 cert 'Build time autogenerated kernel key: 32ca4feee90b5cde51f5f8c0e024b22f8c679982'
zswap: loaded using pool lzo/zbud
Key type trusted registered
Key type encrypted registered
AppArmor: AppArmor sha1 policy hashing enabled
ima: No TPM chip found, activating TPM-bypass!
evm: HMAC attrs: 0x1
  Magic number: 13:123:868
rtc_cmos 00:00: setting system clock to 2017-04-05 04:53:26 UTC (1491368006)
BIOS EDD facility v0.16 2004-Jun-25, 0 devices found
EDD information not available.
PM: Hibernation image not present or could not be loaded.
Freeing unused kernel memory: 1488K (ffffffff81f45000 - ffffffff820b9000)
Write protecting the kernel read-only data: 14336k
Freeing unused kernel memory: 1776K (ffff880001844000 - ffff880001a00000)
Freeing unused kernel memory: 116K (ffff880001de3000 - ffff880001e00000)
random: systemd-udevd: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
random: udevadm: uninitialized urandom read (16 bytes read, 2 bits of entropy available)
virtio_net virtio1 ens4: renamed from eth1
scsi host2: Virtio SCSI HBA
virtio_net virtio0 ens3: renamed from eth0
input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input4
input: VirtualPS/2 VMware VMMouse as /devices/platform/i8042/serio1/input/input3
FDC 0 is a S82078B
AVX2 version of gcm_enc/dec engaged.
AES CTR mode by8 optimization enabled
tsc: Refined TSC clocksource calibration: 2099.966 MHz
clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x1e45107322b, max_idle_ns: 440795291484 ns
md: linear personality registered for level -1
md: multipath personality registered for level -4
md: raid0 personality registered for level 0
md: raid1 personality registered for level 1
raid6: sse2x1   gen()  8388 MB/s
raid6: sse2x1   xor()  6273 MB/s
raid6: sse2x2   gen() 10361 MB/s
raid6: sse2x2   xor()  6842 MB/s
raid6: sse2x4   gen() 12062 MB/s
raid6: sse2x4   xor()  8427 MB/s
raid6: avx2x1   gen() 15909 MB/s
raid6: avx2x2   gen() 19140 MB/s
raid6: avx2x4   gen() 21969 MB/s
raid6: using algorithm avx2x4 gen() 21969 MB/s
raid6: using avx2x2 recovery algorithm
xor: automatically using best checksumming function:
   avx       : 25797.000 MB/sec
async_tx: api initialized (async)
md: raid6 personality registered for level 6
md: raid5 personality registered for level 5
md: raid4 personality registered for level 4
md: raid10 personality registered for level 10
Btrfs loaded
EXT4-fs (vda1): mounted filesystem with ordered data mode. Opts: (null)
systemd[1]: systemd 229 running in system mode. (+PAM +AUDIT +SELINUX +IMA +APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ -LZ4 +SECCOMP +BLKID +ELFUTILS +KMOD -IDN)
systemd[1]: Detected virtualization kvm.
systemd[1]: Detected architecture x86-64.
systemd[1]: Set hostname to .
systemd[1]: Installed transient /etc/machine-id file.
systemd[1]: Listening on udev Control Socket.
systemd[1]: Reached target Swap.
systemd[1]: Reached target Encrypted Volumes.
systemd[1]: Listening on LVM2 poll daemon socket.
systemd[1]: Listening on LVM2 metadata daemon socket.
systemd[1]: Listening on /dev/initctl Compatibility Named Pipe.
systemd[1]: Listening on Journal Audit Socket.
systemd[1]: Created slice User and Session Slice.
systemd[1]: Listening on Journal Socket (/dev/log).
systemd[1]: Created slice System Slice.
systemd[1]: Reached target Slices.
systemd[1]: Reached target User and Group Name Lookups.
systemd[1]: Created slice system-serial\x2dgetty.slice.
systemd[1]: Listening on Journal Socket.
systemd[1]: Mounting Huge Pages File System...
systemd[1]: Mounting Debug File System...
systemd[1]: Starting Load Kernel Modules...
systemd[1]: Starting Nameserver information manager...
systemd[1]: Starting Remount Root and Kernel File Systems...
Loading iSCSI transport class v2.0-870.
systemd[1]: Starting Uncomplicated firewall...
systemd[1]: Starting Create list of required static device nodes for the current kernel...
EXT4-fs (vda1): re-mounted. Opts: (null)
systemd[1]: Set up automount Arbitrary Executable File Formats File System Automount Point.
systemd[1]: Started Forward Password Requests to Wall Directory Watch.
iscsi: registered transport (tcp)
systemd[1]: Mounting POSIX Message Queue File System...
systemd[1]: Starting Set console keymap...
systemd[1]: Listening on Device-mapper event daemon FIFOs.
systemd[1]: Starting Monitoring of LVM2 mirrors, snapshots etc. using dmeventd or progress polling...
systemd[1]: Listening on udev Kernel Socket.
systemd[1]: Listening on Syslog Socket.
systemd[1]: Starting Journal Service...
systemd[1]: Mounted POSIX Message Queue File System.
systemd[1]: Mounted Huge Pages File System.
systemd[1]: Mounted Debug File System.
systemd[1]: Started Remount Root and Kernel File Systems.
systemd[1]: Started Uncomplicated firewall.
systemd[1]: Started Create list of required static device nodes for the current kernel.
systemd[1]: Started Nameserver information manager.
iscsi: registered transport (iser)
systemd[1]: Started Load Kernel Modules.
systemd[1]: Started Journal Service.
systemd-journald[659]: Received request to flush runtime journal from PID 1
ppdev: user-space parallel port driver
virtio_net virtio0 eth0: renamed from ens3
audit: type=1400 audit(1491368010.072:2): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/sbin/dhclient" pid=974 comm="apparmor_parser"
audit: type=1400 audit(1491368010.072:3): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=974 comm="apparmor_parser"
audit: type=1400 audit(1491368010.072:4): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=974 comm="apparmor_parser"
audit: type=1400 audit(1491368010.072:5): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=974 comm="apparmor_parser"
audit: type=1400 audit(1491368010.120:6): apparmor="STATUS" operation="profile_load" profile="unconfined" name="/usr/bin/lxc-start" pid=1043 comm="apparmor_parser"
audit: type=1400 audit(1491368010.144:7): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default" pid=975 comm="apparmor_parser"
audit: type=1400 audit(1491368010.144:8): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-cgns" pid=975 comm="apparmor_parser"
audit: type=1400 audit(1491368010.144:9): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-mounting" pid=975 comm="apparmor_parser"
audit: type=1400 audit(1491368010.144:10): apparmor="STATUS" operation="profile_load" profile="unconfined" name="lxc-container-default-with-nesting" pid=975 comm="apparmor_parser"
EXT4-fs (vda1): resizing filesystem from 576000 to 10485499 blocks
EXT4-fs (vda1): resized filesystem to 10485499
cgroup: new mount options do not match the existing superblock, will be ignored
random: nonblocking pool is initialized
systemd[1]: snapd.refresh.timer: Adding 5h 51min 17.561514s random time.
systemd[1]: snapd.refresh.timer: Adding 2h 25min 59.320435s random time.
systemd[1]: snapd.refresh.timer: Adding 1h 1min 42.582692s random time.
systemd[1]: snapd.refresh.timer: Adding 1h 35min 7.296145s random time.
systemd[1]: snapd.refresh.timer: Adding 2h 16min 45.631638s random time.
systemd[1]: snapd.refresh.timer: Adding 5h 34min 59.708949s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 21min 13.111133s random time.
systemd[1]: snapd.refresh.timer: Adding 4h 33min 39.134150s random time.
systemd[1]: snapd.refresh.timer: Adding 4h 50min 49.579665s random time.
systemd[1]: snapd.refresh.timer: Adding 1h 33min 32.451352s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 47min 9.325973s random time.
systemd[1]: snapd.refresh.timer: Adding 4h 25min 23.505964s random time.
systemd[1]: snapd.refresh.timer: Adding 2h 13min 5.165010s random time.
SGI XFS with ACLs, security attributes, realtime, no debug enabled
JFS: nTxBlock = 8192, nTxLock = 65536
ntfs: driver 2.1.32 [Flags: R/O MODULE].
QNX4 filesystem 0.2.3 registered.
systemd[1]: snapd.refresh.timer: Adding 2h 29min 52.278065s random time.
systemd[1]: snapd.refresh.timer: Adding 1h 13min 33.537913s random time.
systemd[1]: snapd.refresh.timer: Adding 2h 43min 35.386587s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 42min 54.517445s random time.
aufs 4.x-rcN-20160111
systemd[1]: snapd.refresh.timer: Adding 5h 18min 28.870646s random time.
systemd[1]: snapd.refresh.timer: Adding 1h 49min 49.987796s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 45min 33.921352s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 45min 58.720175s random time.
systemd[1]: snapd.refresh.timer: Adding 1h 56min 51.363842s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 30min 10.210993s random time.
systemd[1]: snapd.refresh.timer: Adding 4h 6min 55.470031s random time.
audit_printk_skb: 12 callbacks suppressed
audit: type=1400 audit(1491368975.529:15): apparmor="STATUS" operation="profile_load" profile="unconfined" name="docker-default" pid=1821 comm="apparmor_parser"
bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this.
Bridge firewalling registered
nf_conntrack version 0.5.0 (16384 buckets, 65536 max)
ip_tables: (C) 2000-2006 Netfilter Core Team
Initializing XFRM netlink socket
IPv6: ADDRCONF(NETDEV_UP): docker0: link is not ready
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
systemd[1]: snapd.refresh.timer: Adding 4h 17min 14.795360s random time.
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth2acee59 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth2acee59: link is not ready
eth0: renamed from veth75dc736
IPv6: ADDRCONF(NETDEV_CHANGE): veth2acee59: link becomes ready
docker0: port 1(veth2acee59) entered forwarding state
docker0: port 1(veth2acee59) entered forwarding state
IPv6: ADDRCONF(NETDEV_CHANGE): docker0: link becomes ready
docker0: port 1(veth2acee59) entered disabled state
veth75dc736: renamed from eth0
docker0: port 1(veth2acee59) entered disabled state
device veth2acee59 left promiscuous mode
docker0: port 1(veth2acee59) entered disabled state
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth4827e34 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth4827e34: link is not ready
docker0: port 1(veth4827e34) entered forwarding state
docker0: port 1(veth4827e34) entered forwarding state
eth0: renamed from veth9a10ea0
IPv6: ADDRCONF(NETDEV_CHANGE): veth4827e34: link becomes ready
docker0: port 1(veth4827e34) entered disabled state
veth9a10ea0: renamed from eth0
docker0: port 1(veth4827e34) entered disabled state
device veth4827e34 left promiscuous mode
docker0: port 1(veth4827e34) entered disabled state
auplink[8580]: segfault at 7ffea77a09b8 ip 00007f8e8a56f9c9 sp 00007ffea77a09c0 error 6 in libc-2.23.so[7f8e8a477000+1bf000]
aufs au_plink_put:450:dockerd[1815]: pseudo-link is not flushed
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
auplink[8593]: segfault at 7fff3a0fe918 ip 00007f2c44dae9c9 sp 00007fff3a0fe920 error 6 in libc-2.23.so[7f2c44cb6000+1bf000]
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth1ef5472 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth1ef5472: link is not ready
docker0: port 1(veth1ef5472) entered forwarding state
docker0: port 1(veth1ef5472) entered forwarding state
docker0: port 1(veth1ef5472) entered disabled state
eth0: renamed from veth3318cc1
IPv6: ADDRCONF(NETDEV_CHANGE): veth1ef5472: link becomes ready
docker0: port 1(veth1ef5472) entered forwarding state
docker0: port 1(veth1ef5472) entered forwarding state
docker0: port 1(veth1ef5472) entered disabled state
veth3318cc1: renamed from eth0
docker0: port 1(veth1ef5472) entered disabled state
device veth1ef5472 left promiscuous mode
docker0: port 1(veth1ef5472) entered disabled state
auplink[12188]: segfault at 7ffea54fb2f8 ip 00007fddd4dab9c9 sp 00007ffea54fb300 error 6 in libc-2.23.so[7fddd4cb3000+1bf000]
aufs au_plink_put:450:dockerd[1807]: pseudo-link is not flushed
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
auplink[12197]: segfault at 7ffc19b28668 ip 00007f9e508879c9 sp 00007ffc19b28670 error 6 in libc-2.23.so[7f9e5078f000+1bf000]
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth8347a36 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth8347a36: link is not ready
eth0: renamed from vethb36738f
IPv6: ADDRCONF(NETDEV_CHANGE): veth8347a36: link becomes ready
docker0: port 1(veth8347a36) entered forwarding state
docker0: port 1(veth8347a36) entered forwarding state
docker0: port 1(veth8347a36) entered disabled state
vethb36738f: renamed from eth0
docker0: port 1(veth8347a36) entered disabled state
device veth8347a36 left promiscuous mode
docker0: port 1(veth8347a36) entered disabled state
auplink[12807]: segfault at 7ffda4e550c8 ip 00007fcf66f3b9c9 sp 00007ffda4e550d0 error 6 in libc-2.23.so[7fcf66e43000+1bf000]
aufs au_plink_put:450:dockerd[2413]: pseudo-link is not flushed
aufs au_opts_verify:1597:dockerd[2413]: dirperm1 breaks the protection by the permission bits on the lower branch
auplink[12816]: segfault at 7fff2dc15848 ip 00007fed5f7349c9 sp 00007fff2dc15850 error 6 in libc-2.23.so[7fed5f63c000+1bf000]
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1917]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth133d662 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth133d662: link is not ready
eth0: renamed from veth31d3d04
IPv6: ADDRCONF(NETDEV_CHANGE): veth133d662: link becomes ready
docker0: port 1(veth133d662) entered forwarding state
docker0: port 1(veth133d662) entered forwarding state
docker0: port 1(veth133d662) entered disabled state
veth31d3d04: renamed from eth0
docker0: port 1(veth133d662) entered disabled state
device veth133d662 left promiscuous mode
docker0: port 1(veth133d662) entered disabled state
aufs au_opts_verify:1597:dockerd[1817]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1817]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1817]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1817]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth7f419f7 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth7f419f7: link is not ready
docker0: port 1(veth7f419f7) entered forwarding state
docker0: port 1(veth7f419f7) entered forwarding state
eth0: renamed from vethc5e44b8
IPv6: ADDRCONF(NETDEV_CHANGE): veth7f419f7: link becomes ready
vethc5e44b8: renamed from eth0
docker0: port 1(veth7f419f7) entered disabled state
docker0: port 1(veth7f419f7) entered disabled state
device veth7f419f7 left promiscuous mode
docker0: port 1(veth7f419f7) entered disabled state
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[2413]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth376db1b entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth376db1b: link is not ready
docker0: port 1(veth376db1b) entered forwarding state
docker0: port 1(veth376db1b) entered forwarding state
docker0: port 1(veth376db1b) entered disabled state
eth0: renamed from veth9709065
IPv6: ADDRCONF(NETDEV_CHANGE): veth376db1b: link becomes ready
docker0: port 1(veth376db1b) entered forwarding state
docker0: port 1(veth376db1b) entered forwarding state
docker0: port 1(veth376db1b) entered forwarding state
docker0: port 1(veth376db1b) entered disabled state
veth9709065: renamed from eth0
docker0: port 1(veth376db1b) entered disabled state
device veth376db1b left promiscuous mode
docker0: port 1(veth376db1b) entered disabled state
auplink[17476]: segfault at 7ffd3fc928d8 ip 00007fab0534c9c9 sp 00007ffd3fc928e0 error 6 in libc-2.23.so[7fab05254000+1bf000]
aufs au_plink_put:450:dockerd[1807]: pseudo-link is not flushed
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
auplink[17488]: segfault at 7ffde9e24858 ip 00007f0a9715c9c9 sp 00007ffde9e24860 error 6 in libc-2.23.so[7f0a97064000+1bf000]
aufs au_opts_verify:1597:dockerd[1816]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1816]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1816]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1816]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1816]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1816]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth1236e4b entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth1236e4b: link is not ready
eth0: renamed from veth311e1ed
IPv6: ADDRCONF(NETDEV_CHANGE): veth1236e4b: link becomes ready
docker0: port 1(veth1236e4b) entered forwarding state
docker0: port 1(veth1236e4b) entered forwarding state
docker0: port 1(veth1236e4b) entered forwarding state
docker0: port 1(veth1236e4b) entered disabled state
veth311e1ed: renamed from eth0
docker0: port 1(veth1236e4b) entered disabled state
device veth1236e4b left promiscuous mode
docker0: port 1(veth1236e4b) entered disabled state
auplink[18300]: segfault at 7ffe76a762b8 ip 00007f84e66df9c9 sp 00007ffe76a762c0 error 6 in libc-2.23.so[7f84e65e7000+1bf000]
aufs au_plink_put:450:dockerd[1807]: pseudo-link is not flushed
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
auplink[18310]: segfault at 7ffc15e49a88 ip 00007f06200d09c9 sp 00007ffc15e49a90 error 6 in libc-2.23.so[7f061ffd8000+1bf000]
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
device vethbe9c15f entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): vethbe9c15f: link is not ready
eth0: renamed from veth8c61207
IPv6: ADDRCONF(NETDEV_CHANGE): vethbe9c15f: link becomes ready
docker0: port 1(vethbe9c15f) entered forwarding state
docker0: port 1(vethbe9c15f) entered forwarding state
docker0: port 1(vethbe9c15f) entered disabled state
veth8c61207: renamed from eth0
docker0: port 1(vethbe9c15f) entered disabled state
device vethbe9c15f left promiscuous mode
docker0: port 1(vethbe9c15f) entered disabled state
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1815]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth02c1acb entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth02c1acb: link is not ready
docker0: port 1(veth02c1acb) entered forwarding state
docker0: port 1(veth02c1acb) entered forwarding state
eth0: renamed from veth834fdf0
IPv6: ADDRCONF(NETDEV_CHANGE): veth02c1acb: link becomes ready
docker0: port 1(veth02c1acb) entered disabled state
veth834fdf0: renamed from eth0
docker0: port 1(veth02c1acb) entered disabled state
device veth02c1acb left promiscuous mode
docker0: port 1(veth02c1acb) entered disabled state
aufs au_opts_verify:1597:dockerd[2413]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[2413]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[2413]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
device veth505433b entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): veth505433b: link is not ready
docker0: port 1(veth505433b) entered forwarding state
docker0: port 1(veth505433b) entered forwarding state
eth0: renamed from vethefca831
docker0: port 1(veth505433b) entered disabled state
IPv6: ADDRCONF(NETDEV_CHANGE): veth505433b: link becomes ready
docker0: port 1(veth505433b) entered forwarding state
docker0: port 1(veth505433b) entered forwarding state
docker0: port 1(veth505433b) entered disabled state
vethefca831: renamed from eth0
docker0: port 1(veth505433b) entered disabled state
device veth505433b left promiscuous mode
docker0: port 1(veth505433b) entered disabled state
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1807]: dirperm1 breaks the protection by the permission bits on the lower branch
conntrack: generic helper won't handle protocol 47. Please consider loading the specific helper module.
systemd[1]: snapd.refresh.timer: Adding 1h 9min 21.757474s random time.
systemd[1]: snapd.refresh.timer: Adding 3h 10min 36.162125s random time.
systemd[1]: snapd.refresh.timer: Adding 11min 36.664713s random time.
audit: type=1400 audit(1491410617.428:16): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/sbin/dhclient" pid=31859 comm="apparmor_parser"
audit: type=1400 audit(1491410617.428:17): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-client.action" pid=31859 comm="apparmor_parser"
audit: type=1400 audit(1491410617.428:18): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/NetworkManager/nm-dhcp-helper" pid=31859 comm="apparmor_parser"
audit: type=1400 audit(1491410617.428:19): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/connman/scripts/dhclient-script" pid=31859 comm="apparmor_parser"
audit: type=1400 audit(1491410617.440:20): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/bin/lxc-start" pid=31862 comm="apparmor_parser"
audit: type=1400 audit(1491410617.508:21): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="/usr/lib/lxd/lxd-bridge-proxy" pid=31864 comm="apparmor_parser"
audit: type=1400 audit(1491410617.540:22): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="lxc-container-default" pid=31860 comm="apparmor_parser"
audit: type=1400 audit(1491410617.540:23): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="lxc-container-default-cgns" pid=31860 comm="apparmor_parser"
audit: type=1400 audit(1491410617.540:24): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="lxc-container-default-with-mounting" pid=31860 comm="apparmor_parser"
audit: type=1400 audit(1491410617.540:25): apparmor="STATUS" operation="profile_replace" profile="unconfined" name="lxc-container-default-with-nesting" pid=31860 comm="apparmor_parser"
systemd[1]: snapd.refresh.timer: Adding 5h 26min 17.220686s random time.
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1805]: dirperm1 breaks the protection by the permission bits on the lower branch
aufs au_opts_verify:1597:dockerd[1817]: dirperm1 breaks the protection by the permission bits on the lower branch
device vethc116170 entered promiscuous mode
IPv6: ADDRCONF(NETDEV_UP): vethc116170: link is not ready
eth0: renamed from veth44b94b0
IPv6: ADDRCONF(NETDEV_CHANGE): vethc116170: link becomes ready
docker0: port 1(vethc116170) entered forwarding state
docker0: port 1(vethc116170) entered forwarding state
docker0: port 1(vethc116170) entered forwarding state

Return To 2 x Intel Xeon E5-2695 v4 - - DigitalOcean Droplet System Information