[Thu Jun 26 02:44:30 2025] Unsafe core_pattern used with fs.suid_dumpable=2. Pipe handler or fully qualified core dump path required. Set kernel.core_pattern before fs.suid_dumpable. [Thu Jun 26 03:16:10 2025] hrtimer: interrupt took 14986986 ns [Thu Jun 26 03:35:34 2025] systemd[1]: systemd 249.11-0ubuntu3.16 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [Thu Jun 26 03:35:34 2025] systemd[1]: Detected virtualization kvm. [Thu Jun 26 03:35:34 2025] systemd[1]: Detected architecture arm64. [Thu Jun 26 03:35:34 2025] systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway. [Thu Jun 26 03:35:34 2025] systemd-journald[552]: Received SIGTERM from PID 1 (systemd). [Thu Jun 26 03:35:34 2025] systemd[1]: Stopping Journal Service... [Thu Jun 26 03:35:34 2025] systemd[1]: systemd-journald.service: Deactivated successfully. [Thu Jun 26 03:35:34 2025] systemd[1]: Stopped Journal Service. [Thu Jun 26 03:35:34 2025] systemd[1]: Starting Journal Service... [Thu Jun 26 03:35:34 2025] systemd[1]: Started Journal Service. [Thu Jun 26 03:38:31 2025] systemd[1]: systemd 249.11-0ubuntu3.16 running in system mode (+PAM +AUDIT +SELINUX +APPARMOR +IMA +SMACK +SECCOMP +GCRYPT +GNUTLS +OPENSSL +ACL +BLKID +CURL +ELFUTILS +FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) [Thu Jun 26 03:38:31 2025] systemd[1]: Detected virtualization kvm. [Thu Jun 26 03:38:31 2025] systemd[1]: Detected architecture arm64. [Thu Jun 26 03:38:31 2025] systemd[1]: Configuration file /run/systemd/system/netplan-ovs-cleanup.service is marked world-inaccessible. This has no effect as configuration data is accessible via APIs without restrictions. Proceeding anyway.