Package: linux-image-6.1.0-38-amd64 Version: 6.1.0.38-amd64 The vm’s on VMware ESX hosts got stuck after we update our Farm to linux-image-6.1.0-38-amd64 Our workaround is to downgrade to linux-image-6.1.0-37-amd64 and set linux-image as marked on hold. The Kernel Log shows this: 25-08-19T10:07:29.913807+02:00 HN0VADM001 kernel: (t=5250 jiffies g=11118153 q=4273 ncpus=2) 2025-08-19T10:07:29.913808+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Not tainted 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:07:29.913808+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:07:29.913809+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0xbb/0x2b0 2025-08-19T10:07:29.913809+02:00 HN0VADM001 kernel: Code: 24 00 0f 84 9d 01 00 00 65 48 8b 04 25 80 fb 01 00 c7 40 18 01 00 00 00 4c 8d ab 40 03 00 00 48 89 e6 4c 89 ef e8 85 dc 8b ff <8b> 83 f0 00 00 00 85 c0 0f 84 ac 00 00 00 8b 93 18
01 00 00 03 85 2025-08-19T10:07:29.913811+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246 2025-08-19T10:07:29.913811+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:07:29.913812+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340 2025-08-19T10:07:29.913812+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:07:29.913813+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:07:29.913813+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:07:29.913814+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:07:29.913816+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:07:29.913816+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:07:29.913817+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:07:29.913818+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:07:29.913818+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:07:29.913820+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:07:29.913821+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:07:29.913821+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:07:55.169588+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 45s! [kauditd:28] 2025-08-19T10:07:55.169598+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:07:55.169609+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Not tainted 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:07:55.169609+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:07:55.169610+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0 2025-08-19T10:07:55.169610+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00
65 48 8b 04 25 2025-08-19T10:07:55.169612+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213 2025-08-19T10:07:55.169612+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080 2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:07:55.169614+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:07:55.169615+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:07:55.169615+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:07:55.169617+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:07:55.169617+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:07:55.169620+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:07:55.169620+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:07:55.169621+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:08:23.169574+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 71s! [kauditd:28] 2025-08-19T10:08:23.169583+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:08:23.169595+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:08:23.169595+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:08:23.169596+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_lock_irqsave+0x8/0x50 2025-08-19T10:08:23.169596+02:00 HN0VADM001 kernel: Code: 3d 3d e8 9c 52 e8 68 a3 6b ff 4c 29 e8 49 39 c6 73 d8 80 4d 00 04 eb 8e cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 53 9c 58 <0f> 1f 40 00 48 89 c3 fa 0f 1f 44 00 00 65 ff 05 64
49 9d 52 31 c0 2025-08-19T10:08:23.169598+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bd70 EFLAGS: 00000246 2025-08-19T10:08:23.169598+02:00 HN0VADM001 kernel: RAX: 0000000000000246 RBX: ffff983aefc2a000 RCX: ffff9839c0377800 2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: RDX: 0000000000000500 RSI: ffffbb178010bdb8 RDI: ffff983aefc2a340 2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51 2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010bdb8 2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:08:23.169601+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:08:23.169601+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:08:23.169603+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:08:23.169603+02:00 HN0VADM001 kernel: add_wait_queue+0x1d/0xa0 2025-08-19T10:08:23.169604+02:00 HN0VADM001 kernel: netlink_attachskb+0xbb/0x2b0 2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:08:23.169606+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:08:23.169606+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:08:23.169607+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:08:23.169607+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:08:23.169609+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:08:23.169613+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:08:32.925675+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU 2025-08-19T10:08:32.925684+02:00 HN0VADM001 kernel: rcu: 1-....: (21002 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=10498 2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: (t=21003 jiffies g=11118153 q=9624 ncpus=2) 2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:08:32.925695+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x69/0x2b0 2025-08-19T10:08:32.925695+02:00 HN0VADM001 kernel: Code: 86 d8 00 00 00 48 c7 44 24 18 00 00 00 00 48 c7 44 24 20 00 00 00 00 89 c2 48 c7 44 24 10 c0 0d ce ac f0 0f c1 97 f0 00 00 00 <01> d0 8b 96 d8 00 00 00 39 c2 0f 84 19 01 00 00 8b
b7 18 01 00 00 2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000206 2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RAX: 0000000000000500 RBX: ffff983aefc2a000 RCX: ffff9839c0377800 2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RDX: 0000000000033b00 RSI: ffff9838c2702200 RDI: ffff983aefc2a000 2025-08-19T10:08:32.925697+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51 2025-08-19T10:08:32.925697+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:08:59.169598+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 105s! [kauditd:28] 2025-08-19T10:08:59.169611+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:08:59.169612+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:08:59.169613+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:08:59.169615+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0 2025-08-19T10:08:59.169615+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00
65 48 8b 04 25 2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213 2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080 2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:08:59.169618+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:08:59.169618+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:08:59.169620+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:08:59.169621+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:08:59.169623+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:08:59.169623+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:08:59.169624+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:27.169594+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 131s! [kauditd:28] 2025-08-19T10:09:27.169603+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:09:27.169604+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:27.169604+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:09:27.169606+02:00 HN0VADM001 kernel: RIP: 0010:sk_filter_trim_cap+0x12b/0x250 2025-08-19T10:09:27.169607+02:00 HN0VADM001 kernel: Code: 0a 01 00 00 e8 86 2a 8e ff 4c 89 73 18 45 85 ff 74 1d 45 39 fd 44 89 fe 41 0f 43 f5 3b 73 70 0f 82 8f 00 00 00 e8 55 93 93 ff <e9> 1a ff ff ff 41 bc ff ff ff ff e8 45 93 93 ff e9
0a ff ff ff e8 2025-08-19T10:09:27.169607+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bda8 EFLAGS: 00000246 2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff9838c2702200 RCX: 0000000000000000 2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RDX: ffff9839c0378000 RSI: ffff9838c2702200 RDI: ffff9839c0378000 2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a000 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51 2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000 2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: R13: 0000000000000001 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:09:27.169612+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:27.169613+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:27.169613+02:00 HN0VADM001 kernel: ? netlink_attachskb+0x104/0x2b0 2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel: netlink_unicast+0xdb/0x3d0 2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:09:27.169615+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:09:27.169616+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:09:27.169616+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:27.169618+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:27.169619+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:35.937663+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU 2025-08-19T10:09:35.937671+02:00 HN0VADM001 kernel: rcu: 1-....: (36755 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=18372 2025-08-19T10:09:35.937672+02:00 HN0VADM001 kernel: (t=36756 jiffies g=11118153 q=10925 ncpus=2) 2025-08-19T10:09:35.937673+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:35.937673+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:09:35.937683+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_unlock_irqrestore+0x20/0x40 2025-08-19T10:09:35.937684+02:00 HN0VADM001 kernel: Code: 00 0f 1f 44 00 00 eb ed 66 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 65 ff 0d d0 48 9d 52 <74> 05 c3 cc cc cc cc 0f 1f 44 00 00 c3 cc cc cc cc
66 66 2e 0f 1f 2025-08-19T10:09:35.937684+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb0 EFLAGS: 00000246 2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340 2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:09:35.937706+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:09:35.937706+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:09:35.937707+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:09:35.937718+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel: netlink_attachskb+0xbb/0x2b0 2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:09:35.937720+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:09:35.937720+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:09:35.937722+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:35.937728+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:35.937728+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567659+02:00 HN0VADM001 kernel: INFO: task khugepaged:36 blocked for more than 120 seconds. 2025-08-19T10:09:59.567668+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567669+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567669+02:00 HN0VADM001 kernel: task:khugepaged state:D stack:0 pid:36 ppid:2 flags:0x00004000 2025-08-19T10:09:59.567689+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel: schedule_timeout+0x118/0x150 2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel: wait_for_completion+0x86/0x160 2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel: __flush_work.isra.0+0x173/0x280 2025-08-19T10:09:59.567694+02:00 HN0VADM001 kernel: ? flush_workqueue_prep_pwqs+0x110/0x110 2025-08-19T10:09:59.567694+02:00 HN0VADM001 kernel: __lru_add_drain_all+0x147/0x1f0 2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel: khugepaged+0x63/0x970 2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel: ? collapse_pte_mapped_thp+0x5d0/0x5d0 2025-08-19T10:09:59.567696+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:59.567698+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel: INFO: task jbd2/sda3-8:215 blocked for more than 120 seconds. 2025-08-19T10:09:59.567700+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567700+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567701+02:00 HN0VADM001 kernel: task:jbd2/sda3-8 state:D stack:0 pid:215 ppid:2 flags:0x00004000 2025-08-19T10:09:59.567703+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567703+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.567705+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.567707+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.567707+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel: jbd2_journal_commit_transaction+0x119d/0x1a50 [jbd2] 2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel: ? psi_task_switch+0xf7/0x1f0 2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel: ? finish_task_switch.isra.0+0x90/0x2d0 2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel: kjournald2+0xa9/0x280 [jbd2] 2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel: ? jbd2_fc_wait_bufs+0xa0/0xa0 [jbd2] 2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:59.567713+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:59.567715+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: INFO: task ir_agent:2750268 blocked for more than 120 seconds. 2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: task:ir_agent state:D stack:0 pid:2750268 ppid:650 flags:0x00000002 2025-08-19T10:09:59.567717+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567719+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.567721+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.567722+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel: do_get_write_access+0x244/0x3b0 [jbd2] 2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel: jbd2_journal_get_write_access+0x5b/0x80 [jbd2] 2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel: __ext4_journal_get_write_access+0x81/0x180 [ext4] 2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel: ext4_reserve_inode_write+0x5d/0xb0 [ext4] 2025-08-19T10:09:59.567731+02:00 HN0VADM001 kernel: __ext4_mark_inode_dirty+0x74/0x240 [ext4] 2025-08-19T10:09:59.567732+02:00 HN0VADM001 kernel: ? __ext4_journal_start_sb+0x105/0x120 [ext4] 2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel: ext4_dirty_inode+0x56/0x80 [ext4] 2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel: __mark_inode_dirty+0x56/0x380 2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel: generic_update_time+0x78/0xc0 2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel: file_modified_flags+0xda/0x100 2025-08-19T10:09:59.567736+02:00 HN0VADM001 kernel: ext4_buffered_write_iter+0x55/0x140 [ext4] 2025-08-19T10:09:59.567736+02:00 HN0VADM001 kernel: vfs_write+0x232/0x3f0 2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel: ksys_write+0x6b/0xf0 2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel: do_syscall_64+0x55/0xb0 2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel: ? audit_filter_inodes.part.0+0x2e/0x120 2025-08-19T10:09:59.567738+02:00 HN0VADM001 kernel: ? audit_filter_inodes.part.0+0x2e/0x120 2025-08-19T10:09:59.567738+02:00 HN0VADM001 kernel: ? audit_reset_context+0x232/0x300 2025-08-19T10:09:59.567744+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x40/0x1e0 2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567746+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567746+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel: entry_SYSCALL_64_after_hwframe+0x6e/0xd8 2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RIP: 0033:0x7f8d707cd33f 2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RSP: 002b:00007f8d22ff4160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 0000000000000057 RCX: 00007f8d707cd33f 2025-08-19T10:09:59.567751+02:00 HN0VADM001 kernel: RDX: 0000000000000057 RSI: 00007f8d4c053290 RDI: 0000000000000003 2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: RBP: 00007f8d22ff5630 R08: 0000000000000000 R09: 0000000000977de0 2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: R10: 000000000018c1c3 R11: 0000000000000293 R12: 00000000388b9a10 2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: R13: 00007f8d4c053290 R14: 0000000000000003 R15: 00007f8d48006820 2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel: INFO: task wdavdaemon:2561488 blocked for more than 120 seconds. 2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567761+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567762+02:00 HN0VADM001 kernel: task:wdavdaemon state:D stack:0 pid:2561488 ppid:2561477 flags:0x00000002 2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567766+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.567766+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.567768+02:00 HN0VADM001 kernel: do_get_write_access+0x244/0x3b0 [jbd2] 2025-08-19T10:09:59.567772+02:00 HN0VADM001 kernel: jbd2_journal_get_write_access+0x5b/0x80 [jbd2] 2025-08-19T10:09:59.567773+02:00 HN0VADM001 kernel: __ext4_journal_get_write_access+0x81/0x180 [ext4] 2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel: ext4_reserve_inode_write+0x5d/0xb0 [ext4] 2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel: __ext4_mark_inode_dirty+0x74/0x240 [ext4] 2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel: ? __ext4_journal_start_sb+0x105/0x120 [ext4] 2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel: ext4_dirty_inode+0x56/0x80 [ext4] 2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel: __mark_inode_dirty+0x56/0x380 2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel: generic_update_time+0x78/0xc0 2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel: file_modified_flags+0xda/0x100 2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel: ext4_buffered_write_iter+0x55/0x140 [ext4] 2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel: vfs_write+0x232/0x3f0 2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel: ksys_write+0x6b/0xf0 2025-08-19T10:09:59.567779+02:00 HN0VADM001 kernel: do_syscall_64+0x55/0xb0 2025-08-19T10:09:59.567781+02:00 HN0VADM001 kernel: ? wake_bit_function+0x4b/0x70 2025-08-19T10:09:59.567781+02:00 HN0VADM001 kernel: ?
__wake_up_common+0x76/0x180 2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel: ?
__slab_free+0xbf/0x2d0 2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel: ?
__slab_free+0xbf/0x2d0 2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel: ? sched_clock_cpu+0x9/0xb0 2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel: ? psi_group_change+0x152/0x370 2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel: ? save_fpregs_to_fpstate+0x39/0x90 2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel: ?
__rseq_handle_notify_resume+0xa9/0x4a0 2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel: ? finish_task_switch.isra.0+0x90/0x2d0 2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel: ? restore_fpregs_from_fpstate+0x38/0x90 2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel: ? switch_fpu_return+0x4c/0xd0 2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567788+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: entry_SYSCALL_64_after_hwframe+0x6e/0xd8 2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: RIP: 0033:0x7fd3d031733f 2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: RSP: 002b:00007fd3bc7edf50 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 2025-08-19T10:09:59.567795+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 0000000000000070 RCX: 00007fd3d031733f 2025-08-19T10:09:59.567796+02:00 HN0VADM001 kernel: RDX: 0000000000000070 RSI: 000056358e0018b0 RDI: 0000000000000017 2025-08-19T10:09:59.567796+02:00 HN0VADM001 kernel: RBP: 000056358e0018b0 R08: 0000000000000000 R09: 0000000000000044 2025-08-19T10:09:59.567797+02:00 HN0VADM001 kernel: R10: 0000000000260308 R11: 0000000000000293 R12: 0000000000000070 2025-08-19T10:09:59.567831+02:00 HN0VADM001 kernel: R13: 000056358e0a9a40 R14: 0000000000000070 R15: 00007fd3d03ed9e0 2025-08-19T10:09:59.567832+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567837+02:00 HN0VADM001 kernel: INFO: task kworker/u4:3:2732080 blocked for more than 120 seconds. 2025-08-19T10:09:59.567838+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567838+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: task:kworker/u4:3 state:D stack:0 pid:2732080 ppid:2 flags:0x00004000 2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0) 2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567840+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.567848+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel: do_get_write_access+0x244/0x3b0 [jbd2] 2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel: jbd2_journal_get_write_access+0x5b/0x80 [jbd2] 2025-08-19T10:09:59.567850+02:00 HN0VADM001 kernel: __ext4_journal_get_write_access+0x81/0x180 [ext4] 2025-08-19T10:09:59.567850+02:00 HN0VADM001 kernel: ? ext4_get_group_desc+0x5a/0xf0 [ext4] 2025-08-19T10:09:59.567852+02:00 HN0VADM001 kernel: ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4] 2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel: ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4] 2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel: ext4_mb_new_blocks+0x4d4/0x11f0 [ext4] 2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel: ? ext4_find_extent+0x1a2/0x430 [ext4] 2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel: ext4_ext_map_blocks+0x66a/0x19b0 [ext4] 2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel: ? release_pages+0x159/0x470 2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel: ? find_get_pages_range_tag+0x1a9/0x200 2025-08-19T10:09:59.567859+02:00 HN0VADM001 kernel: ? __pagevec_release+0x1b/0x60 2025-08-19T10:09:59.567860+02:00 HN0VADM001 kernel: ext4_map_blocks+0x1b6/0x5f0 [ext4] 2025-08-19T10:09:59.567860+02:00 HN0VADM001 kernel: ext4_writepages+0x8a0/0x11e0 [ext4] 2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel: ? ext4_inode_csum+0x20b/0x290 [ext4] 2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel: do_writepages+0xbd/0x1c0 2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel: ? find_busiest_group+0x41/0x370 2025-08-19T10:09:59.567866+02:00 HN0VADM001 kernel: __writeback_single_inode+0x3d/0x360 2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel: writeback_sb_inodes+0x1f5/0x4d0 2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel: __writeback_inodes_wb+0x4c/0xf0 2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel: wb_writeback+0x204/0x2f0 2025-08-19T10:09:59.567868+02:00 HN0VADM001 kernel: wb_workfn+0x350/0x4f0 2025-08-19T10:09:59.567868+02:00 HN0VADM001 kernel: process_one_work+0x1c7/0x380 2025-08-19T10:09:59.567869+02:00 HN0VADM001 kernel: worker_thread+0x4d/0x380 2025-08-19T10:09:59.567873+02:00 HN0VADM001 kernel: ? rescuer_thread+0x3a0/0x3a0 2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:59.567875+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567875+02:00 HN0VADM001 kernel: INFO: task systemd-journal:2739475 blocked for more than 120 seconds. 2025-08-19T10:09:59.567878+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567878+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: task:systemd-journal state:D stack:0 pid:2739475 ppid:1 flags:0x00000002 2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567880+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567882+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567882+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.567884+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.567886+02:00 HN0VADM001 kernel: do_get_write_access+0x244/0x3b0 [jbd2] 2025-08-19T10:09:59.567886+02:00 HN0VADM001 kernel: jbd2_journal_get_write_access+0x5b/0x80 [jbd2] 2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel: __ext4_journal_get_write_access+0x81/0x180 [ext4] 2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel: ext4_reserve_inode_write+0x5d/0xb0 [ext4] 2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel: ext4_orphan_add+0x295/0x530 [ext4] 2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel: ? jbd2__journal_start+0xf8/0x1e0 [jbd2] 2025-08-19T10:09:59.567892+02:00 HN0VADM001 kernel: ext4_truncate+0x19e/0x490 [ext4] 2025-08-19T10:09:59.567893+02:00 HN0VADM001 kernel: ext4_setattr+0x8db/0xb50 [ext4] 2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel: notify_change+0x2ad/0x5c0 2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel: ? do_truncate+0x94/0xe0 2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel: do_truncate+0x94/0xe0 2025-08-19T10:09:59.567895+02:00 HN0VADM001 kernel: do_sys_ftruncate+0x150/0x1a0 2025-08-19T10:09:59.567896+02:00 HN0VADM001 kernel: do_syscall_64+0x55/0xb0 2025-08-19T10:09:59.567897+02:00 HN0VADM001 kernel: ? __seccomp_filter+0x32a/0x4e0 2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel: ? audit_filter_inodes.part.0+0x2e/0x120 2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel: ? audit_reset_context+0x232/0x300 2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x40/0x1e0 2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.567899+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.567903+02:00 HN0VADM001 kernel: ? __mod_lruvec_page_state+0x93/0x140 2025-08-19T10:09:59.567904+02:00 HN0VADM001 kernel: ? page_add_file_rmap+0x178/0x2f0 2025-08-19T10:09:59.567904+02:00 HN0VADM001 kernel: ? balance_dirty_pages_ratelimited_flags+0x12f/0x380 2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel: ? fault_dirty_shared_page+0x9a/0x110 2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel: ? do_fault+0x2f7/0x410 2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel: ? __handle_mm_fault+0x660/0xfa0 2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel: ? __seccomp_filter+0x32a/0x4e0 2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel: ? audit_filter_inodes.part.0+0x2e/0x120 2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel: ? audit_reset_context+0x232/0x300 2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x40/0x1e0 2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel: ? handle_mm_fault+0xdb/0x2d0 2025-08-19T10:09:59.567912+02:00 HN0VADM001 kernel: ? do_user_addr_fault+0x191/0x550 2025-08-19T10:09:59.567912+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567920+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.567926+02:00 HN0VADM001 kernel: entry_SYSCALL_64_after_hwframe+0x6e/0xd8 2025-08-19T10:09:59.567927+02:00 HN0VADM001 kernel: RIP: 0033:0x7f764c510be7 2025-08-19T10:09:59.567927+02:00 HN0VADM001 kernel: RSP: 002b:00007fff6fe3f1b8 EFLAGS: 00000206 ORIG_RAX: 000000000000004d 2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 000056076d935030 RCX: 00007f764c510be7 2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RDX: 000056076d934dd0 RSI: 0000000002800000 RDI: 0000000000000025 2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RBP: 000056076d92e610 R08: 000056076d93336c R09: 000056076d9350bc 2025-08-19T10:09:59.567929+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 00007fff6fe3f200 2025-08-19T10:09:59.567931+02:00 HN0VADM001 kernel: R13: 00007fff6fe3f1f8 R14: 000056076d92e610 R15: 0000000000000003 2025-08-19T10:09:59.567931+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: INFO: task kworker/u4:4:2743798 blocked for more than 120 seconds. 2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.567933+02:00 HN0VADM001 kernel: task:kworker/u4:4 state:D stack:0 pid:2743798 ppid:2 flags:0x00004000 2025-08-19T10:09:59.567935+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0) 2025-08-19T10:09:59.567935+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.567942+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.567943+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.567943+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel: do_get_write_access+0x244/0x3b0 [jbd2] 2025-08-19T10:09:59.567945+02:00 HN0VADM001 kernel: jbd2_journal_get_write_access+0x5b/0x80 [jbd2] 2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel: __ext4_journal_get_write_access+0x81/0x180 [ext4] 2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel: ? ext4_get_group_desc+0x5a/0xf0 [ext4] 2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel: ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4] 2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel: ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4] 2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel: ext4_mb_new_blocks+0x4d4/0x11f0 [ext4] 2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel: ? ext4_find_extent+0x1a2/0x430 [ext4] 2025-08-19T10:09:59.567953+02:00 HN0VADM001 kernel: ext4_ext_map_blocks+0x66a/0x19b0 [ext4] 2025-08-19T10:09:59.567954+02:00 HN0VADM001 kernel: ? release_pages+0x159/0x470 2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel: ? find_get_pages_range_tag+0x1a9/0x200 2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel: ? __pagevec_release+0x1b/0x60 2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel: ext4_map_blocks+0x1b6/0x5f0 [ext4] 2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel: ext4_writepages+0x8a0/0x11e0 [ext4] 2025-08-19T10:09:59.567957+02:00 HN0VADM001 kernel: ? wb_update_bandwidth+0x4e/0x70 2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel: do_writepages+0xbd/0x1c0 2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel: __writeback_single_inode+0x3d/0x360 2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel: ? wbc_detach_inode+0xfd/0x220 2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel: writeback_sb_inodes+0x1f5/0x4d0 2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel: __writeback_inodes_wb+0x4c/0xf0 2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel: wb_writeback+0x204/0x2f0 2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel: wb_workfn+0x350/0x4f0 2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel: ? check_preempt_curr+0x5d/0x70 2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel: ? ttwu_do_wakeup+0x17/0x170 2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel: process_one_work+0x1c7/0x380 2025-08-19T10:09:59.567996+02:00 HN0VADM001 kernel: worker_thread+0x4d/0x380 2025-08-19T10:09:59.567996+02:00 HN0VADM001 kernel: ? rescuer_thread+0x3a0/0x3a0 2025-08-19T10:09:59.567998+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel: INFO: task kworker/u4:5:2743799 blocked for more than 120 seconds. 2025-08-19T10:09:59.568000+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.568000+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.568002+02:00 HN0VADM001 kernel: task:kworker/u4:5 state:D stack:0 pid:2743799 ppid:2 flags:0x00004000 2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0) 2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.568004+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.568006+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.568006+02:00 HN0VADM001 kernel: bit_wait_io+0xd/0x60 2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel: __wait_on_bit+0x4b/0x140 2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel: ? out_of_line_wait_on_bit_lock+0xb0/0xb0 2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel: out_of_line_wait_on_bit+0x91/0xb0 2025-08-19T10:09:59.568008+02:00 HN0VADM001 kernel: ? sugov_init+0x350/0x350 2025-08-19T10:09:59.568009+02:00 HN0VADM001 kernel: do_get_write_access+0x244/0x3b0 [jbd2] 2025-08-19T10:09:59.568010+02:00 HN0VADM001 kernel: jbd2_journal_get_write_access+0x5b/0x80 [jbd2] 2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel: __ext4_journal_get_write_access+0x81/0x180 [ext4] 2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel: ? ext4_get_group_desc+0x5a/0xf0 [ext4] 2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel: ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4] 2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel: ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4] 2025-08-19T10:09:59.568012+02:00 HN0VADM001 kernel: ext4_mb_new_blocks+0x4d4/0x11f0 [ext4] 2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel: ? ext4_find_extent+0x1a2/0x430 [ext4] 2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel: ext4_ext_map_blocks+0x66a/0x19b0 [ext4] 2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel: ? release_pages+0x159/0x470 2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel: ? find_get_pages_range_tag+0x1a9/0x200 2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel: ? __pagevec_release+0x1b/0x60 2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel: ext4_map_blocks+0x1b6/0x5f0 [ext4] 2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel: ext4_writepages+0x8a0/0x11e0 [ext4] 2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel: ? ext4_inode_csum+0x20b/0x290 [ext4] 2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel: do_writepages+0xbd/0x1c0 2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel: ? __percpu_counter_sum+0x5a/0x70 2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel: __writeback_single_inode+0x3d/0x360 2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel: ? fprop_fraction_percpu+0x2b/0x80 2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel: writeback_sb_inodes+0x1f5/0x4d0 2025-08-19T10:09:59.568025+02:00 HN0VADM001 kernel: __writeback_inodes_wb+0x4c/0xf0 2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel: wb_writeback+0x204/0x2f0 2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel: wb_workfn+0x350/0x4f0 2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel: process_one_work+0x1c7/0x380 2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel: worker_thread+0x4d/0x380 2025-08-19T10:09:59.568027+02:00 HN0VADM001 kernel: ? rescuer_thread+0x3a0/0x3a0 2025-08-19T10:09:59.568029+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel: INFO: task rs:main Q:Reg:2748590 blocked for more than 120 seconds. 2025-08-19T10:09:59.568031+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.568032+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.568033+02:00 HN0VADM001 kernel: task:rs:main Q:Reg state:D stack:0 pid:2748590 ppid:1 flags:0x00000002 2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.568035+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.568035+02:00 HN0VADM001 kernel: io_schedule+0x42/0x70 2025-08-19T10:09:59.568039+02:00 HN0VADM001 kernel: folio_wait_bit_common+0x13d/0x350 2025-08-19T10:09:59.568040+02:00 HN0VADM001 kernel: ? filemap_alloc_folio+0x100/0x100 2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel: __filemap_get_folio+0x310/0x340 2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel: pagecache_get_page+0x11/0x60 2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel: ext4_da_write_begin+0x10c/0x2c0 [ext4] 2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel: generic_perform_write+0xd0/0x210 2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel: ext4_buffered_write_iter+0x84/0x140 [ext4] 2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel: vfs_write+0x232/0x3f0 2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel: ksys_write+0x6b/0xf0 2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel: do_syscall_64+0x55/0xb0 2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel: ? __alloc_pages+0xf0/0x330 2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel: ? __mod_memcg_lruvec_state+0x41/0x90 2025-08-19T10:09:59.568046+02:00 HN0VADM001 kernel: ?
__mod_lruvec_page_state+0x93/0x140 2025-08-19T10:09:59.568048+02:00 HN0VADM001 kernel: ? page_add_new_anon_rmap+0x6c/0x120 2025-08-19T10:09:59.568048+02:00 HN0VADM001 kernel: ? set_pte+0x5/0x10 2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel: ? __handle_mm_fault+0xeef/0xfa0 2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel: ? handle_mm_fault+0xdb/0x2d0 2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel: ? do_user_addr_fault+0x1b0/0x550 2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel: entry_SYSCALL_64_after_hwframe+0x6e/0xd8 2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel: RIP: 0033:0x7efcf5aad9ee 2025-08-19T10:09:59.568054+02:00 HN0VADM001 kernel: RSP: 002b:00007efcf5129778 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 00007efcf512a6c0 RCX: 00007efcf5aad9ee 2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RDX: 0000000000000c48 RSI: 00007efcec0013b0 RDI: 0000000000000007 2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RBP: 00007efcec0013b0 R08: 0000000000000000 R09: 0000000000000000 2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcec0010c0 2025-08-19T10:09:59.568058+02:00 HN0VADM001 kernel: R13: 0000000000000000 R14: 00005613ea5702f0 R15: 0000561424a94b20 2025-08-19T10:09:59.568058+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:09:59.568060+02:00 HN0VADM001 kernel: INFO: task update-mime-dat:2753217 blocked for more than 120 seconds. 2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. 2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: task:update-mime-dat state:D stack:0 pid:2753217 ppid:2753215 flags:0x00004002 2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:09:59.568062+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:09:59.568064+02:00 HN0VADM001 kernel: __schedule+0x34d/0x9e0 2025-08-19T10:09:59.568064+02:00 HN0VADM001 kernel: schedule+0x5a/0xd0 2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel: jbd2_log_wait_commit+0xd3/0x140 [jbd2] 2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel: ext4_sync_file+0x160/0x370 [ext4] 2025-08-19T10:09:59.568066+02:00 HN0VADM001 kernel: __x64_sys_fdatasync+0x48/0x90 2025-08-19T10:09:59.568066+02:00 HN0VADM001 kernel: do_syscall_64+0x55/0xb0 2025-08-19T10:09:59.568068+02:00 HN0VADM001 kernel: ? audit_reset_context+0x232/0x300 2025-08-19T10:09:59.568068+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x40/0x1e0 2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel: ? fsnotify+0x318/0x840 2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel: ? fsnotify+0x522/0x840 2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel: ? __fsnotify_parent+0x10f/0x3a0 2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel: ?
__fsnotify_parent+0x11f/0x3a0 2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel: ? __rseq_handle_notify_resume+0xa9/0x4a0 2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel: ? mntput_no_expire+0x4a/0x250 2025-08-19T10:09:59.568073+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x40/0x1e0 2025-08-19T10:09:59.568073+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.568074+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x40/0x1e0 2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel: ? exit_to_user_mode_prepare+0x14b/0x1e0 2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel: ? syscall_exit_to_user_mode+0x1e/0x40 2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel: ? do_syscall_64+0x61/0xb0 2025-08-19T10:09:59.568083+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568085+02:00 HN0VADM001 kernel: ? clear_bhb_loop+0x30/0x80 2025-08-19T10:09:59.568085+02:00 HN0VADM001 kernel: entry_SYSCALL_64_after_hwframe+0x6e/0xd8 2025-08-19T10:09:59.568087+02:00 HN0VADM001 kernel: RIP: 0033:0x7fe7de499687 2025-08-19T10:09:59.568087+02:00 HN0VADM001 kernel: RSP: 002b:00007ffdfc97b2a0 EFLAGS: 00000202 ORIG_RAX: 000000000000004b 2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 00007fe7de86fbc0 RCX: 00007fe7de499687 2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RBP: 000056153ff2ebf0 R08: 0000000000000000 R09: 0000000000000000 2025-08-19T10:09:59.568089+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000 2025-08-19T10:09:59.568089+02:00 HN0VADM001 kernel: R13: 00007ffdfc97b330 R14: 0000000000000003 R15: 00007ffdfc97b428 2025-08-19T10:09:59.568091+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:10:03.169592+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 164s! [kauditd:28] 2025-08-19T10:10:03.169602+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:10:03.169603+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:10:03.169603+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:10:03.169641+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0xbb/0x2b0 2025-08-19T10:10:03.169641+02:00 HN0VADM001 kernel: Code: 24 00 0f 84 9d 01 00 00 65 48 8b 04 25 80 fb 01 00 c7 40 18 01 00 00 00 4c 8d ab 40 03 00 00 48 89 e6 4c 89 ef e8 85 dc 8b ff <8b> 83 f0 00 00 00 85 c0 0f 84 ac 00 00 00 8b 93 18
01 00 00 03 85 2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246 2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340 2025-08-19T10:10:03.169645+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:10:03.169656+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:10:03.169658+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:10:31.169575+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 190s! [kauditd:28] 2025-08-19T10:10:31.169583+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:10:31.169584+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:10:31.169584+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc.
VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:10:31.169608+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0xee/0x3d0 2025-08-19T10:10:31.169608+02:00 HN0VADM001 kernel: Code: 01 0f 85 29 01 00 00 ba 01 00 00 00 4c 89 e6 48 89 df e8 55 73 fb ff 85 c0 0f 85 30 02 00 00 48 89 e9 48 8d 54 24 08 4c 89 e6 <48> 89 df e8 5a fc ff ff 83 f8 01 0f 85 43 02 00 00
0f b7 85 04 02 2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000246 2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff983aefc2a000 RCX: ffff9839c0377800 2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RDX: ffffbb178010be18 RSI: ffff9838c2702200 RDI: ffff9839c0378000 2025-08-19T10:10:31.169612+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51 2025-08-19T10:10:31.169612+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200 2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:10:31.169614+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:10:31.169614+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:10:31.169629+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:10:31.169630+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:10:31.169632+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:10:31.169634+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:10:31.169636+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:10:38.949656+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU 2025-08-19T10:10:38.949686+02:00 HN0VADM001 kernel: rcu: 1-....: (52508 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=26248 2025-08-19T10:10:38.949687+02:00 HN0VADM001 kernel: (t=52509 jiffies g=11118153 q=11629 ncpus=2) 2025-08-19T10:10:38.949687+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0 2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00
65 48 8b 04 25 2025-08-19T10:10:38.949691+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213 2025-08-19T10:10:38.949692+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:10:38.949692+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080 2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:10:38.949707+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:10:38.949708+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:11:03.169577+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 220s! [kauditd:28] 2025-08-19T10:11:03.169609+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:11:03.169611+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:11:03.169611+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc.
VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:11:03.169612+02:00 HN0VADM001 kernel: RIP: 0010:__netlink_lookup+0x6c/0x150 2025-08-19T10:11:03.169612+02:00 HN0VADM001 kernel: Code: 8b 4c 24 04 8b 54 24 08 2d 05 41 52 21 01 c1 01 c2 03 04 24 89 ce 31 ca c1 c6 0e 29 f2 89 d6 31 d0 c1 c6 0b 29 f0 89 c6 31 c1 <c1> ce 07 29 f1 89 ce 31 ca c1 c6
10 29 f2 89 d6 31 d0 c1 c6 04 29 2025-08-19T10:11:03.169615+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bde0 EFLAGS: 00000286 2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RAX: 00000000674d4698 RBX: ffff9839c01d4750 RCX: 00000000cb4c0590 2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RDX: 000000002e01cfc1 RSI: 00000000674d4698 RDI: ffff9839c01d4750 2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RBP: ffff9839c2c7bcc0 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:11:03.169617+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200 2025-08-19T10:11:03.169617+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffffffffafc95cc0 2025-08-19T10:11:03.169619+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:11:03.169621+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:11:03.169621+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:11:03.169624+02:00 HN0VADM001 kernel: netlink_unicast+0x130/0x3d0 2025-08-19T10:11:03.169624+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:11:03.169629+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:11:03.169629+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:11:31.169579+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [kauditd:28] 2025-08-19T10:11:31.169587+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:11:31.169612+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:11:31.169612+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:11:31.169613+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_unlock_irqrestore+0x19/0x40 2025-08-19T10:11:31.169613+02:00 HN0VADM001 kernel: Code: cc cc cc e9 d9 6a 3b 00 0f 1f 44 00 00 eb ed 66 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 <65> ff 0d d0 48 9d 52 74 05 c3 cc cc cc cc 0f 1f 44
00 00 c3 cc cc 2025-08-19T10:11:31.169617+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb0 EFLAGS: 00000206 2025-08-19T10:11:31.169617+02:00 HN0VADM001 kernel: RAX: dead000000000122 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340 2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:11:31.169619+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:11:31.169621+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:11:31.169622+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:11:31.169622+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel: netlink_attachskb+0x104/0x2b0 2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:11:41.962221+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU 2025-08-19T10:11:41.962293+02:00 HN0VADM001 kernel: rcu: 1-....: (68261 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=34124 2025-08-19T10:11:41.962294+02:00 HN0VADM001 kernel: (t=68262 jiffies g=11118153 q=13913 ncpus=2) 2025-08-19T10:11:41.962295+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:11:41.962295+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:11:41.962296+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_lock_irqsave+0x8/0x50 2025-08-19T10:11:41.962296+02:00 HN0VADM001 kernel: Code: 3d 3d e8 9c 52 e8 68 a3 6b ff 4c 29 e8 49 39 c6 73 d8 80 4d 00 04 eb 8e cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 53 9c 58 <0f> 1f 40 00 48 89 c3 fa 0f 1f 44 00 00 65 ff 05 64
49 9d 52 31 c0 2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bd88 EFLAGS: 00000246 2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RAX: 0000000000000246 RBX: ffffbb178010bdb8 RCX: ffff983aefc2a348 2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RDX: 0000000000034000 RSI: ffffbb178010bdb8 RDI: ffff983aefc2a340 2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a340 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:11:41.962304+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:11:41.962304+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:11:41.962306+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:11:41.962308+02:00 HN0VADM001 kernel: remove_wait_queue+0x14/0x60 2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel: netlink_attachskb+0x104/0x2b0 2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:11:41.962313+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:11:41.962313+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:11:41.962315+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:11:41.962317+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:12:07.169578+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 280s! [kauditd:28] 2025-08-19T10:12:07.169587+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:12:07.169588+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:12:07.169588+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc.
VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:12:07.169609+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0x8b/0x3d0 2025-08-19T10:12:07.169609+02:00 HN0VADM001 kernel: Code: 07 48 8b 85 90 01 00 00 48 89 44 24 08 41 be 01 00 00 00 e9 86 00 00 00 4c 8d b8 80 00 00 00 44 89 f0 f0 0f c1 83 80 00 00 00 <85> c0 0f 84 3d 01 00 00 8d 50 01 09 c2 0f 88 1b 01
00 00 e8 0d 08 2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000206 2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RAX: 0000000000000002 RBX: ffff983aefc2a000 RCX: 0000000000000428 2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a428 RSI: ffffffffafc95cc0 RDI: ffff9839c0378000 2025-08-19T10:12:07.169611+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51 2025-08-19T10:12:07.169614+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200 2025-08-19T10:12:07.169614+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:12:07.169616+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:12:07.169618+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:12:07.169620+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:12:07.169620+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:12:07.169624+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:12:35.169582+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 306s! [kauditd:28] 2025-08-19T10:12:35.169625+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:12:35.169627+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:12:35.169627+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:12:35.169628+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0 2025-08-19T10:12:35.169628+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00
65 48 8b 04 25 2025-08-19T10:12:35.169631+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213 2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348 2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080 2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51 2025-08-19T10:12:35.169633+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:12:35.169633+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:12:35.169639+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:12:35.169640+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:12:35.169644+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:12:35.169646+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:12:35.169646+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:12:35.169650+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:12:35.169650+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:12:44.974221+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU 2025-08-19T10:12:44.974256+02:00 HN0VADM001 kernel: rcu: 1-....: (84014 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=41999 2025-08-19T10:12:44.974257+02:00 HN0VADM001 kernel: (t=84015 jiffies g=11118153 q=15612 ncpus=2) 2025-08-19T10:12:44.974257+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: RIP: 0010:sk_filter_trim_cap+0x36/0x250 2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: Code: 89 d5 41 54 55 48 89 fd 53 48 89 f3 48 83 ec 30 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 f6 46 7e 40 0f 85 54 01 00 00 <eb> 3c 48 89 de 48 89 ef e8 3d 5b c4 ff 41 89 c4 85
c0 74 56 48 8b 2025-08-19T10:12:44.974261+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bda8 EFLAGS: 00000246 2025-08-19T10:12:44.974262+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff9838c2702200 RCX: 0000000000000428 2025-08-19T10:12:44.974262+02:00 HN0VADM001 kernel: RDX: 0000000000000001 RSI: ffff9838c2702200 RDI: ffff983aefc2a000 2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a000 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51 2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200 2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: R13: 0000000000000001 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:12:44.974270+02:00 HN0VADM001 kernel: ? netlink_attachskb+0x104/0x2b0 2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel: netlink_unicast+0xdb/0x3d0 2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:12:44.974272+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:12:44.974272+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:12:44.974286+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:12:44.974287+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:12:44.974289+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:13:11.169603+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 339s! [kauditd:28] 2025-08-19T10:13:11.169613+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:13:11.169614+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:13:11.169614+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:13:11.169615+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x44/0x2b0 2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: Code: 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 48 c7 04 24 00 00 00 00 65 48 8b 04 25 80 fb 01 00 48 89 44 24 08 8b 86 d8 00 00 00 <48> c7 44 24 18 00 00 00 00 48 c7 44 24 20 00 00 00
00 89 c2 48 c7 2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246 2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: RAX: 0000000000000500 RBX: ffff983aefc2a000 RCX: ffff9839c0377800 2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: RDX: ffffbb178010be18 RSI: ffff9838c2702200 RDI: ffff983aefc2a000 2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51 2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:13:11.169628+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:13:11.169630+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:13:11.169632+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:13:11.169632+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:13:39.169605+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 365s! [kauditd:28] 2025-08-19T10:13:39.169615+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables
libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3
sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16
mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common 2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc.
VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0x8b/0x3d0 2025-08-19T10:13:39.169619+02:00 HN0VADM001 kernel: Code: 07 48 8b 85 90 01 00 00 48 89 44 24 08 41 be 01 00 00 00 e9 86 00 00 00 4c 8d b8 80 00 00 00 44 89 f0 f0 0f c1 83 80 00 00 00 <85> c0 0f 84 3d 01 00 00 8d 50 01 09 c2 0f 88 1b 01
00 00 e8 0d 08 2025-08-19T10:13:39.169620+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000206 2025-08-19T10:13:39.169620+02:00 HN0VADM001 kernel: RAX: 0000000000000002 RBX: ffff983aefc2a000 RCX: 0000000000000428 2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a428 RSI: ffffffffafc95cc0 RDI: ffff9839c0378000 2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51 2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200 2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:13:39.169628+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:13:39.169628+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:13:39.169636+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:13:39.169636+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:13:39.169640+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:13:47.986167+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU 2025-08-19T10:13:47.986176+02:00 HN0VADM001 kernel: rcu: 1-....: (99767 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=49873 2025-08-19T10:13:47.986201+02:00 HN0VADM001 kernel: (t=99768 jiffies g=11118153 q=16506 ncpus=2) 2025-08-19T10:13:47.986201+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G L 6.1.0-38-amd64 #1 Debian 6.1.147-1 2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020 2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x79/0x2b0 2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: Code: 44 24 20 00 00 00 00 89 c2 48 c7 44 24 10 c0 0d ce ac f0 0f c1 97 f0 00 00 00 01 d0 8b 96 d8 00 00 00 39 c2 0f 84 19 01 00 00 <8b> b7 18 01 00 00 39 f0 0f 82 0b 01 00 00 f0 29 93
f0 00 00 00 49 2025-08-19T10:13:47.986203+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000287 2025-08-19T10:13:47.986206+02:00 HN0VADM001 kernel: RAX: 0000000000034000 RBX: ffff983aefc2a000 RCX: ffff9839c0377800 2025-08-19T10:13:47.986206+02:00 HN0VADM001 kernel: RDX: 0000000000000500 RSI: ffff9838c2702200 RDI: ffff983aefc2a000 2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51 2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18 2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080 2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: FS: 0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000 2025-08-19T10:13:47.986210+02:00 HN0VADM001 kernel: CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 2025-08-19T10:13:47.986210+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0 2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: PKRU: 55555554 2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: Call Trace: 2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: <TASK> 2025-08-19T10:13:47.986212+02:00 HN0VADM001 kernel: ? wake_up_q+0x90/0x90 2025-08-19T10:13:47.986212+02:00 HN0VADM001 kernel: netlink_unicast+0xf6/0x3d0 2025-08-19T10:13:47.986214+02:00 HN0VADM001 kernel: ? audit_net_exit+0x30/0x30 2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel: kauditd_send_queue+0xab/0x180 2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel: ? audit_log_lost+0x90/0x90 2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel: kauditd_thread+0x12e/0x2d0 2025-08-19T10:13:47.986216+02:00 HN0VADM001 kernel: ? cpuusage_read+0x10/0x10 2025-08-19T10:13:47.986216+02:00 HN0VADM001 kernel: ? auditd_reset+0x90/0x90 2025-08-19T10:13:47.986219+02:00 HN0VADM001 kernel: kthread+0xda/0x100 2025-08-19T10:13:47.986219+02:00 HN0VADM001 kernel: ? kthread_complete_and_exit+0x20/0x20 2025-08-19T10:13:47.986220+02:00 HN0VADM001 kernel: ret_from_fork+0x1f/0x30 2025-08-19T10:13:47.986220+02:00 HN0VADM001 kernel: </TASK> 2025-08-19T10:14:15.229595+02:00 HN0VADM001 kernel: kauditd_printk_skb: 1244 callbacks suppressed Thomas Kloppholz
experimenta gGmbH Experimenta-Platz 74072 Heilbronn Tel. +49 7131 88795 384 E-Mail: thomas.kloppholz@experimenta.science Web: https://www.experimenta.science Informationspflicht zum Schutz Ihrer Daten: Die Datenschutzhinweise beinhalten Angaben zur Verarbeitung personenbezogener Daten sowie Informationen zu Rechten und Pflichten unserer Besucher/-innen und Geschäftspartner. Mehr Informationen: https://www.experimenta.science/datenschutz Sitz Heilbronn, Amtsgericht Stuttgart HRB 722941, Ust-IdNr. DE 26 47 48 920 Vorsitzende des Aufsichtsrates: Prof. Dr. Bärbel G. Renner Geschäftsführung: Dr. Franziska Lang und Nico Wiest Diese E-Mail ist nur für den benannten Empfänger bestimmt und kann Informationen enthalten, die vertraulich sind. Durch die Übersendung wird nicht auf die Rechte am Inhalt oder auf die Vertraulichkeit verzichtet. Bitte informieren Sie uns unverzüglich, wenn Sie diese E-Mail irrtümlich erhalten haben und löschen Sie die Nachricht. Vielen Dank. This e-mail is intended for the named recipient(s) only and may contain information that is privileged and confidential. Nothing in this e-mail is intended to constitute a waiver of any privilege or the confidentiality of this message. If you have received this e-mail in error, please notify us immediately by reply and delete this message. Thank you. |