[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1111538: marked as done (Kernel 6.1.0.38-amd64 soft lockup on vmware )



Your message dated Wed, 27 Aug 2025 07:02:56 +0000
with message-id <E1urABM-007yKv-2o@fasolo.debian.org>
and subject line Bug#1111017: fixed in linux 6.1.148-1
has caused the Debian Bug report #1111017,
regarding Kernel 6.1.0.38-amd64 soft lockup on vmware 
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1111017: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111017
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---

Package: linux-image-6.1.0-38-amd64

Version: 6.1.0.38-amd64

 

The vm’s on VMware ESX hosts got stuck after we update our Farm to linux-image-6.1.0-38-amd64

 

Our workaround is to downgrade to linux-image-6.1.0-37-amd64 and set linux-image as marked on hold.

 

 

 

The Kernel Log shows this:

 

25-08-19T10:07:29.913807+02:00 HN0VADM001 kernel:     (t=5250 jiffies g=11118153 q=4273 ncpus=2)

2025-08-19T10:07:29.913808+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Not tainted 6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:07:29.913808+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:07:29.913809+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0xbb/0x2b0

2025-08-19T10:07:29.913809+02:00 HN0VADM001 kernel: Code: 24 00 0f 84 9d 01 00 00 65 48 8b 04 25 80 fb 01 00 c7 40 18 01 00 00 00 4c 8d ab 40 03 00 00 48 89 e6 4c 89 ef e8 85 dc 8b ff <8b> 83 f0 00 00 00 85 c0 0f 84 ac 00 00 00 8b 93 18 01 00 00 03 85

2025-08-19T10:07:29.913811+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246

2025-08-19T10:07:29.913811+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:07:29.913812+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:07:29.913812+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:07:29.913813+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:07:29.913813+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:07:29.913814+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:07:29.913816+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:07:29.913816+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:07:29.913817+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:07:29.913818+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:07:29.913818+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:07:29.913820+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:07:29.913821+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:07:29.913821+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:07:55.169588+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 45s! [kauditd:28]

2025-08-19T10:07:55.169598+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:07:55.169609+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Not tainted 6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:07:55.169609+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:07:55.169610+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:07:55.169610+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:07:55.169612+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:07:55.169612+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:07:55.169614+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:07:55.169615+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:07:55.169615+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:07:55.169617+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:07:55.169617+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:07:55.169620+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:07:55.169620+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:07:55.169621+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:08:23.169574+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 71s! [kauditd:28]

2025-08-19T10:08:23.169583+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:08:23.169595+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:08:23.169595+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:08:23.169596+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_lock_irqsave+0x8/0x50

2025-08-19T10:08:23.169596+02:00 HN0VADM001 kernel: Code: 3d 3d e8 9c 52 e8 68 a3 6b ff 4c 29 e8 49 39 c6 73 d8 80 4d 00 04 eb 8e cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 53 9c 58 <0f> 1f 40 00 48 89 c3 fa 0f 1f 44 00 00 65 ff 05 64 49 9d 52 31 c0

2025-08-19T10:08:23.169598+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bd70 EFLAGS: 00000246

2025-08-19T10:08:23.169598+02:00 HN0VADM001 kernel: RAX: 0000000000000246 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: RDX: 0000000000000500 RSI: ffffbb178010bdb8 RDI: ffff983aefc2a340

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010bdb8

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:08:23.169601+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:08:23.169601+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:08:23.169603+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:08:23.169603+02:00 HN0VADM001 kernel:  add_wait_queue+0x1d/0xa0

2025-08-19T10:08:23.169604+02:00 HN0VADM001 kernel:  netlink_attachskb+0xbb/0x2b0

2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:08:23.169606+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:08:23.169606+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:08:23.169607+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:08:23.169607+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:08:23.169609+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:08:23.169613+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:08:32.925675+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:08:32.925684+02:00 HN0VADM001 kernel: rcu:        1-....: (21002 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=10498

2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel:     (t=21003 jiffies g=11118153 q=9624 ncpus=2)

2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:08:32.925695+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x69/0x2b0

2025-08-19T10:08:32.925695+02:00 HN0VADM001 kernel: Code: 86 d8 00 00 00 48 c7 44 24 18 00 00 00 00 48 c7 44 24 20 00 00 00 00 89 c2 48 c7 44 24 10 c0 0d ce ac f0 0f c1 97 f0 00 00 00 <01> d0 8b 96 d8 00 00 00 39 c2 0f 84 19 01 00 00 8b b7 18 01 00 00

2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000206

2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RAX: 0000000000000500 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RDX: 0000000000033b00 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:08:32.925697+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:08:32.925697+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:08:59.169598+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 105s! [kauditd:28]

2025-08-19T10:08:59.169611+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:08:59.169612+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:08:59.169613+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:08:59.169615+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:08:59.169615+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:08:59.169618+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:08:59.169618+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:08:59.169620+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:08:59.169621+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:08:59.169623+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:08:59.169623+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:08:59.169624+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:27.169594+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 131s! [kauditd:28]

2025-08-19T10:09:27.169603+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:09:27.169604+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:09:27.169604+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:09:27.169606+02:00 HN0VADM001 kernel: RIP: 0010:sk_filter_trim_cap+0x12b/0x250

2025-08-19T10:09:27.169607+02:00 HN0VADM001 kernel: Code: 0a 01 00 00 e8 86 2a 8e ff 4c 89 73 18 45 85 ff 74 1d 45 39 fd 44 89 fe 41 0f 43 f5 3b 73 70 0f 82 8f 00 00 00 e8 55 93 93 ff <e9> 1a ff ff ff 41 bc ff ff ff ff e8 45 93 93 ff e9 0a ff ff ff e8

2025-08-19T10:09:27.169607+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bda8 EFLAGS: 00000246

2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff9838c2702200 RCX: 0000000000000000

2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RDX: ffff9839c0378000 RSI: ffff9838c2702200 RDI: ffff9839c0378000

2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a000 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000

2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: R13: 0000000000000001 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:09:27.169612+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:27.169613+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:27.169613+02:00 HN0VADM001 kernel:  ? netlink_attachskb+0x104/0x2b0

2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel:  netlink_unicast+0xdb/0x3d0

2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:09:27.169615+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:09:27.169616+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:09:27.169616+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:27.169618+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:27.169619+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:35.937663+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:09:35.937671+02:00 HN0VADM001 kernel: rcu:        1-....: (36755 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=18372

2025-08-19T10:09:35.937672+02:00 HN0VADM001 kernel:     (t=36756 jiffies g=11118153 q=10925 ncpus=2)

2025-08-19T10:09:35.937673+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:09:35.937673+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:09:35.937683+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_unlock_irqrestore+0x20/0x40

2025-08-19T10:09:35.937684+02:00 HN0VADM001 kernel: Code: 00 0f 1f 44 00 00 eb ed 66 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 65 ff 0d d0 48 9d 52 <74> 05 c3 cc cc cc cc 0f 1f 44 00 00 c3 cc cc cc cc 66 66 2e 0f 1f

2025-08-19T10:09:35.937684+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb0 EFLAGS: 00000246

2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:09:35.937706+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:09:35.937706+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:09:35.937707+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:09:35.937718+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel:  netlink_attachskb+0xbb/0x2b0

2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:09:35.937720+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:09:35.937720+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:09:35.937722+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:35.937728+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:35.937728+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567659+02:00 HN0VADM001 kernel: INFO: task khugepaged:36 blocked for more than 120 seconds.

2025-08-19T10:09:59.567668+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567669+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567669+02:00 HN0VADM001 kernel: task:khugepaged      state:D stack:0     pid:36    ppid:2      flags:0x00004000

2025-08-19T10:09:59.567689+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel:  schedule_timeout+0x118/0x150

2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel:  wait_for_completion+0x86/0x160

2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel:  __flush_work.isra.0+0x173/0x280

2025-08-19T10:09:59.567694+02:00 HN0VADM001 kernel:  ? flush_workqueue_prep_pwqs+0x110/0x110

2025-08-19T10:09:59.567694+02:00 HN0VADM001 kernel:  __lru_add_drain_all+0x147/0x1f0

2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel:  khugepaged+0x63/0x970

2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel:  ? collapse_pte_mapped_thp+0x5d0/0x5d0

2025-08-19T10:09:59.567696+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567698+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel: INFO: task jbd2/sda3-8:215 blocked for more than 120 seconds.

2025-08-19T10:09:59.567700+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567700+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567701+02:00 HN0VADM001 kernel: task:jbd2/sda3-8     state:D stack:0     pid:215   ppid:2      flags:0x00004000

2025-08-19T10:09:59.567703+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567703+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567705+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567707+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567707+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  jbd2_journal_commit_transaction+0x119d/0x1a50 [jbd2]

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  ? psi_task_switch+0xf7/0x1f0

2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel:  ? finish_task_switch.isra.0+0x90/0x2d0

2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel:  kjournald2+0xa9/0x280 [jbd2]

2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel:  ? jbd2_fc_wait_bufs+0xa0/0xa0 [jbd2]

2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567713+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567715+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: INFO: task ir_agent:2750268 blocked for more than 120 seconds.

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: task:ir_agent        state:D stack:0     pid:2750268 ppid:650    flags:0x00000002

2025-08-19T10:09:59.567717+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567719+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567721+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567722+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel:  ext4_reserve_inode_write+0x5d/0xb0 [ext4]

2025-08-19T10:09:59.567731+02:00 HN0VADM001 kernel:  __ext4_mark_inode_dirty+0x74/0x240 [ext4]

2025-08-19T10:09:59.567732+02:00 HN0VADM001 kernel:  ? __ext4_journal_start_sb+0x105/0x120 [ext4]

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  ext4_dirty_inode+0x56/0x80 [ext4]

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  __mark_inode_dirty+0x56/0x380

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  generic_update_time+0x78/0xc0

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  file_modified_flags+0xda/0x100

2025-08-19T10:09:59.567736+02:00 HN0VADM001 kernel:  ext4_buffered_write_iter+0x55/0x140 [ext4]

2025-08-19T10:09:59.567736+02:00 HN0VADM001 kernel:  vfs_write+0x232/0x3f0

2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel:  ksys_write+0x6b/0xf0

2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567738+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567738+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.567744+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567746+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567746+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RIP: 0033:0x7f8d707cd33f

2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RSP: 002b:00007f8d22ff4160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001

2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 0000000000000057 RCX: 00007f8d707cd33f

2025-08-19T10:09:59.567751+02:00 HN0VADM001 kernel: RDX: 0000000000000057 RSI: 00007f8d4c053290 RDI: 0000000000000003

2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: RBP: 00007f8d22ff5630 R08: 0000000000000000 R09: 0000000000977de0

2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: R10: 000000000018c1c3 R11: 0000000000000293 R12: 00000000388b9a10

2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: R13: 00007f8d4c053290 R14: 0000000000000003 R15: 00007f8d48006820

2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel: INFO: task wdavdaemon:2561488 blocked for more than 120 seconds.

2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567761+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567762+02:00 HN0VADM001 kernel: task:wdavdaemon      state:D stack:0     pid:2561488 ppid:2561477 flags:0x00000002

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567766+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567766+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567768+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567772+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567773+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  ext4_reserve_inode_write+0x5d/0xb0 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  __ext4_mark_inode_dirty+0x74/0x240 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  ? __ext4_journal_start_sb+0x105/0x120 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  ext4_dirty_inode+0x56/0x80 [ext4]

2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel:  __mark_inode_dirty+0x56/0x380

2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel:  generic_update_time+0x78/0xc0

2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel:  file_modified_flags+0xda/0x100

2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel:  ext4_buffered_write_iter+0x55/0x140 [ext4]

2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel:  vfs_write+0x232/0x3f0

2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel:  ksys_write+0x6b/0xf0

2025-08-19T10:09:59.567779+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.567781+02:00 HN0VADM001 kernel:  ? wake_bit_function+0x4b/0x70

2025-08-19T10:09:59.567781+02:00 HN0VADM001 kernel:  ? __wake_up_common+0x76/0x180

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? __slab_free+0xbf/0x2d0

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? __slab_free+0xbf/0x2d0

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? sched_clock_cpu+0x9/0xb0

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? psi_group_change+0x152/0x370

2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel:  ? save_fpregs_to_fpstate+0x39/0x90

2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel:  ? __rseq_handle_notify_resume+0xa9/0x4a0

2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel:  ? finish_task_switch.isra.0+0x90/0x2d0

2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel:  ? restore_fpregs_from_fpstate+0x38/0x90

2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel:  ? switch_fpu_return+0x4c/0xd0

2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567788+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: RIP: 0033:0x7fd3d031733f

2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: RSP: 002b:00007fd3bc7edf50 EFLAGS: 00000293 ORIG_RAX: 0000000000000001

2025-08-19T10:09:59.567795+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 0000000000000070 RCX: 00007fd3d031733f

2025-08-19T10:09:59.567796+02:00 HN0VADM001 kernel: RDX: 0000000000000070 RSI: 000056358e0018b0 RDI: 0000000000000017

2025-08-19T10:09:59.567796+02:00 HN0VADM001 kernel: RBP: 000056358e0018b0 R08: 0000000000000000 R09: 0000000000000044

2025-08-19T10:09:59.567797+02:00 HN0VADM001 kernel: R10: 0000000000260308 R11: 0000000000000293 R12: 0000000000000070

2025-08-19T10:09:59.567831+02:00 HN0VADM001 kernel: R13: 000056358e0a9a40 R14: 0000000000000070 R15: 00007fd3d03ed9e0

2025-08-19T10:09:59.567832+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567837+02:00 HN0VADM001 kernel: INFO: task kworker/u4:3:2732080 blocked for more than 120 seconds.

2025-08-19T10:09:59.567838+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567838+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: task:kworker/u4:3    state:D stack:0     pid:2732080 ppid:2      flags:0x00004000

2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0)

2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567840+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567848+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567850+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567850+02:00 HN0VADM001 kernel:  ? ext4_get_group_desc+0x5a/0xf0 [ext4]

2025-08-19T10:09:59.567852+02:00 HN0VADM001 kernel:  ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4]

2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel:  ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4]

2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel:  ext4_mb_new_blocks+0x4d4/0x11f0 [ext4]

2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel:  ? ext4_find_extent+0x1a2/0x430 [ext4]

2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel:  ext4_ext_map_blocks+0x66a/0x19b0 [ext4]

2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel:  ? release_pages+0x159/0x470

2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel:  ? find_get_pages_range_tag+0x1a9/0x200

2025-08-19T10:09:59.567859+02:00 HN0VADM001 kernel:  ? __pagevec_release+0x1b/0x60

2025-08-19T10:09:59.567860+02:00 HN0VADM001 kernel:  ext4_map_blocks+0x1b6/0x5f0 [ext4]

2025-08-19T10:09:59.567860+02:00 HN0VADM001 kernel:  ext4_writepages+0x8a0/0x11e0 [ext4]

2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel:  ? ext4_inode_csum+0x20b/0x290 [ext4]

2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel:  do_writepages+0xbd/0x1c0

2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel:  ? find_busiest_group+0x41/0x370

2025-08-19T10:09:59.567866+02:00 HN0VADM001 kernel:  __writeback_single_inode+0x3d/0x360

2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel:  writeback_sb_inodes+0x1f5/0x4d0

2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel:  __writeback_inodes_wb+0x4c/0xf0

2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel:  wb_writeback+0x204/0x2f0

2025-08-19T10:09:59.567868+02:00 HN0VADM001 kernel:  wb_workfn+0x350/0x4f0

2025-08-19T10:09:59.567868+02:00 HN0VADM001 kernel:  process_one_work+0x1c7/0x380

2025-08-19T10:09:59.567869+02:00 HN0VADM001 kernel:  worker_thread+0x4d/0x380

2025-08-19T10:09:59.567873+02:00 HN0VADM001 kernel:  ? rescuer_thread+0x3a0/0x3a0

2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567875+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567875+02:00 HN0VADM001 kernel: INFO: task systemd-journal:2739475 blocked for more than 120 seconds.

2025-08-19T10:09:59.567878+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567878+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: task:systemd-journal state:D stack:0     pid:2739475 ppid:1      flags:0x00000002

2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567880+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567882+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567882+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567884+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567886+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567886+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  ext4_reserve_inode_write+0x5d/0xb0 [ext4]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  ext4_orphan_add+0x295/0x530 [ext4]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  ? jbd2__journal_start+0xf8/0x1e0 [jbd2]

2025-08-19T10:09:59.567892+02:00 HN0VADM001 kernel:  ext4_truncate+0x19e/0x490 [ext4]

2025-08-19T10:09:59.567893+02:00 HN0VADM001 kernel:  ext4_setattr+0x8db/0xb50 [ext4]

2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel:  notify_change+0x2ad/0x5c0

2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel:  ? do_truncate+0x94/0xe0

2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel:  do_truncate+0x94/0xe0

2025-08-19T10:09:59.567895+02:00 HN0VADM001 kernel:  do_sys_ftruncate+0x150/0x1a0

2025-08-19T10:09:59.567896+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.567897+02:00 HN0VADM001 kernel:  ? __seccomp_filter+0x32a/0x4e0

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.567899+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.567903+02:00 HN0VADM001 kernel:  ? __mod_lruvec_page_state+0x93/0x140

2025-08-19T10:09:59.567904+02:00 HN0VADM001 kernel:  ? page_add_file_rmap+0x178/0x2f0

2025-08-19T10:09:59.567904+02:00 HN0VADM001 kernel:  ? balance_dirty_pages_ratelimited_flags+0x12f/0x380

2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel:  ? fault_dirty_shared_page+0x9a/0x110

2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel:  ? do_fault+0x2f7/0x410

2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel:  ? __handle_mm_fault+0x660/0xfa0

2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel:  ? __seccomp_filter+0x32a/0x4e0

2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? handle_mm_fault+0xdb/0x2d0

2025-08-19T10:09:59.567912+02:00 HN0VADM001 kernel:  ? do_user_addr_fault+0x191/0x550

2025-08-19T10:09:59.567912+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567920+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567926+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.567927+02:00 HN0VADM001 kernel: RIP: 0033:0x7f764c510be7

2025-08-19T10:09:59.567927+02:00 HN0VADM001 kernel: RSP: 002b:00007fff6fe3f1b8 EFLAGS: 00000206 ORIG_RAX: 000000000000004d

2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 000056076d935030 RCX: 00007f764c510be7

2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RDX: 000056076d934dd0 RSI: 0000000002800000 RDI: 0000000000000025

2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RBP: 000056076d92e610 R08: 000056076d93336c R09: 000056076d9350bc

2025-08-19T10:09:59.567929+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 00007fff6fe3f200

2025-08-19T10:09:59.567931+02:00 HN0VADM001 kernel: R13: 00007fff6fe3f1f8 R14: 000056076d92e610 R15: 0000000000000003

2025-08-19T10:09:59.567931+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: INFO: task kworker/u4:4:2743798 blocked for more than 120 seconds.

2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567933+02:00 HN0VADM001 kernel: task:kworker/u4:4    state:D stack:0     pid:2743798 ppid:2      flags:0x00004000

2025-08-19T10:09:59.567935+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0)

2025-08-19T10:09:59.567935+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567942+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567943+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567943+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567945+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel:  ? ext4_get_group_desc+0x5a/0xf0 [ext4]

2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel:  ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4]

2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel:  ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4]

2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel:  ext4_mb_new_blocks+0x4d4/0x11f0 [ext4]

2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel:  ? ext4_find_extent+0x1a2/0x430 [ext4]

2025-08-19T10:09:59.567953+02:00 HN0VADM001 kernel:  ext4_ext_map_blocks+0x66a/0x19b0 [ext4]

2025-08-19T10:09:59.567954+02:00 HN0VADM001 kernel:  ? release_pages+0x159/0x470

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ? find_get_pages_range_tag+0x1a9/0x200

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ? __pagevec_release+0x1b/0x60

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ext4_map_blocks+0x1b6/0x5f0 [ext4]

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ext4_writepages+0x8a0/0x11e0 [ext4]

2025-08-19T10:09:59.567957+02:00 HN0VADM001 kernel:  ? wb_update_bandwidth+0x4e/0x70

2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel:  do_writepages+0xbd/0x1c0

2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel:  __writeback_single_inode+0x3d/0x360

2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel:  ? wbc_detach_inode+0xfd/0x220

2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel:  writeback_sb_inodes+0x1f5/0x4d0

2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel:  __writeback_inodes_wb+0x4c/0xf0

2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel:  wb_writeback+0x204/0x2f0

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  wb_workfn+0x350/0x4f0

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  ? check_preempt_curr+0x5d/0x70

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  ? ttwu_do_wakeup+0x17/0x170

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  process_one_work+0x1c7/0x380

2025-08-19T10:09:59.567996+02:00 HN0VADM001 kernel:  worker_thread+0x4d/0x380

2025-08-19T10:09:59.567996+02:00 HN0VADM001 kernel:  ? rescuer_thread+0x3a0/0x3a0

2025-08-19T10:09:59.567998+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel: INFO: task kworker/u4:5:2743799 blocked for more than 120 seconds.

2025-08-19T10:09:59.568000+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.568000+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.568002+02:00 HN0VADM001 kernel: task:kworker/u4:5    state:D stack:0     pid:2743799 ppid:2      flags:0x00004000

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0)

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.568004+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.568006+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.568006+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.568008+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.568009+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.568010+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  ? ext4_get_group_desc+0x5a/0xf0 [ext4]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4]

2025-08-19T10:09:59.568012+02:00 HN0VADM001 kernel:  ext4_mb_new_blocks+0x4d4/0x11f0 [ext4]

2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel:  ? ext4_find_extent+0x1a2/0x430 [ext4]

2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel:  ext4_ext_map_blocks+0x66a/0x19b0 [ext4]

2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel:  ? release_pages+0x159/0x470

2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel:  ? find_get_pages_range_tag+0x1a9/0x200

2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel:  ? __pagevec_release+0x1b/0x60

2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel:  ext4_map_blocks+0x1b6/0x5f0 [ext4]

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  ext4_writepages+0x8a0/0x11e0 [ext4]

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  ? ext4_inode_csum+0x20b/0x290 [ext4]

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  do_writepages+0xbd/0x1c0

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  ? __percpu_counter_sum+0x5a/0x70

2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel:  __writeback_single_inode+0x3d/0x360

2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel:  ? fprop_fraction_percpu+0x2b/0x80

2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel:  writeback_sb_inodes+0x1f5/0x4d0

2025-08-19T10:09:59.568025+02:00 HN0VADM001 kernel:  __writeback_inodes_wb+0x4c/0xf0

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  wb_writeback+0x204/0x2f0

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  wb_workfn+0x350/0x4f0

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  process_one_work+0x1c7/0x380

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  worker_thread+0x4d/0x380

2025-08-19T10:09:59.568027+02:00 HN0VADM001 kernel:  ? rescuer_thread+0x3a0/0x3a0

2025-08-19T10:09:59.568029+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel: INFO: task rs:main Q:Reg:2748590 blocked for more than 120 seconds.

2025-08-19T10:09:59.568031+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.568032+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.568033+02:00 HN0VADM001 kernel: task:rs:main Q:Reg   state:D stack:0     pid:2748590 ppid:1      flags:0x00000002

2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.568035+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.568035+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.568039+02:00 HN0VADM001 kernel:  folio_wait_bit_common+0x13d/0x350

2025-08-19T10:09:59.568040+02:00 HN0VADM001 kernel:  ? filemap_alloc_folio+0x100/0x100

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  __filemap_get_folio+0x310/0x340

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  pagecache_get_page+0x11/0x60

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  ext4_da_write_begin+0x10c/0x2c0 [ext4]

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  generic_perform_write+0xd0/0x210

2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel:  ext4_buffered_write_iter+0x84/0x140 [ext4]

2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel:  vfs_write+0x232/0x3f0

2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel:  ksys_write+0x6b/0xf0

2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel:  ? __alloc_pages+0xf0/0x330

2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel:  ? __mod_memcg_lruvec_state+0x41/0x90

2025-08-19T10:09:59.568046+02:00 HN0VADM001 kernel:  ? __mod_lruvec_page_state+0x93/0x140

2025-08-19T10:09:59.568048+02:00 HN0VADM001 kernel:  ? page_add_new_anon_rmap+0x6c/0x120

2025-08-19T10:09:59.568048+02:00 HN0VADM001 kernel:  ? set_pte+0x5/0x10

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? __handle_mm_fault+0xeef/0xfa0

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? handle_mm_fault+0xdb/0x2d0

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? do_user_addr_fault+0x1b0/0x550

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel: RIP: 0033:0x7efcf5aad9ee

2025-08-19T10:09:59.568054+02:00 HN0VADM001 kernel: RSP: 002b:00007efcf5129778 EFLAGS: 00000246 ORIG_RAX: 0000000000000001

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 00007efcf512a6c0 RCX: 00007efcf5aad9ee

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RDX: 0000000000000c48 RSI: 00007efcec0013b0 RDI: 0000000000000007

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RBP: 00007efcec0013b0 R08: 0000000000000000 R09: 0000000000000000

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcec0010c0

2025-08-19T10:09:59.568058+02:00 HN0VADM001 kernel: R13: 0000000000000000 R14: 00005613ea5702f0 R15: 0000561424a94b20

2025-08-19T10:09:59.568058+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.568060+02:00 HN0VADM001 kernel: INFO: task update-mime-dat:2753217 blocked for more than 120 seconds.

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: task:update-mime-dat state:D stack:0     pid:2753217 ppid:2753215 flags:0x00004002

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.568062+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.568064+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.568064+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel:  jbd2_log_wait_commit+0xd3/0x140 [jbd2]

2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel:  ext4_sync_file+0x160/0x370 [ext4]

2025-08-19T10:09:59.568066+02:00 HN0VADM001 kernel:  __x64_sys_fdatasync+0x48/0x90

2025-08-19T10:09:59.568066+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.568068+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.568068+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? fsnotify+0x318/0x840

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? fsnotify+0x522/0x840

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? __fsnotify_parent+0x10f/0x3a0

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? __fsnotify_parent+0x11f/0x3a0

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? __rseq_handle_notify_resume+0xa9/0x4a0

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? mntput_no_expire+0x4a/0x250

2025-08-19T10:09:59.568073+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.568073+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568074+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x14b/0x1e0

2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568083+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568085+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568085+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.568087+02:00 HN0VADM001 kernel: RIP: 0033:0x7fe7de499687

2025-08-19T10:09:59.568087+02:00 HN0VADM001 kernel: RSP: 002b:00007ffdfc97b2a0 EFLAGS: 00000202 ORIG_RAX: 000000000000004b

2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 00007fe7de86fbc0 RCX: 00007fe7de499687

2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003

2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RBP: 000056153ff2ebf0 R08: 0000000000000000 R09: 0000000000000000

2025-08-19T10:09:59.568089+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000

2025-08-19T10:09:59.568089+02:00 HN0VADM001 kernel: R13: 00007ffdfc97b330 R14: 0000000000000003 R15: 00007ffdfc97b428

2025-08-19T10:09:59.568091+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:10:03.169592+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 164s! [kauditd:28]

2025-08-19T10:10:03.169602+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:10:03.169603+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:10:03.169603+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:10:03.169641+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0xbb/0x2b0

2025-08-19T10:10:03.169641+02:00 HN0VADM001 kernel: Code: 24 00 0f 84 9d 01 00 00 65 48 8b 04 25 80 fb 01 00 c7 40 18 01 00 00 00 4c 8d ab 40 03 00 00 48 89 e6 4c 89 ef e8 85 dc 8b ff <8b> 83 f0 00 00 00 85 c0 0f 84 ac 00 00 00 8b 93 18 01 00 00 03 85

2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246

2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:10:03.169645+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:10:03.169656+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:10:03.169658+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:10:31.169575+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 190s! [kauditd:28]

2025-08-19T10:10:31.169583+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:10:31.169584+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:10:31.169584+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:10:31.169608+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0xee/0x3d0

2025-08-19T10:10:31.169608+02:00 HN0VADM001 kernel: Code: 01 0f 85 29 01 00 00 ba 01 00 00 00 4c 89 e6 48 89 df e8 55 73 fb ff 85 c0 0f 85 30 02 00 00 48 89 e9 48 8d 54 24 08 4c 89 e6 <48> 89 df e8 5a fc ff ff 83 f8 01 0f 85 43 02 00 00 0f b7 85 04 02

2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000246

2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RDX: ffffbb178010be18 RSI: ffff9838c2702200 RDI: ffff9839c0378000

2025-08-19T10:10:31.169612+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:10:31.169612+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:10:31.169614+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:10:31.169614+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:10:31.169629+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:10:31.169630+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:10:31.169632+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:10:31.169634+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:10:31.169636+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:10:38.949656+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:10:38.949686+02:00 HN0VADM001 kernel: rcu:        1-....: (52508 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=26248

2025-08-19T10:10:38.949687+02:00 HN0VADM001 kernel:     (t=52509 jiffies g=11118153 q=11629 ncpus=2)

2025-08-19T10:10:38.949687+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:10:38.949691+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:10:38.949692+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:10:38.949692+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:10:38.949707+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:10:38.949708+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:11:03.169577+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 220s! [kauditd:28]

2025-08-19T10:11:03.169609+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:11:03.169611+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:11:03.169611+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:11:03.169612+02:00 HN0VADM001 kernel: RIP: 0010:__netlink_lookup+0x6c/0x150

2025-08-19T10:11:03.169612+02:00 HN0VADM001 kernel: Code: 8b 4c 24 04 8b 54 24 08 2d 05 41 52 21 01 c1 01 c2 03 04 24 89 ce 31 ca c1 c6 0e 29 f2 89 d6 31 d0 c1 c6 0b 29 f0 89 c6 31 c1 <c1> ce 07 29 f1 89 ce 31 ca c1 c6 10 29 f2 89 d6 31 d0 c1 c6 04 29

2025-08-19T10:11:03.169615+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bde0 EFLAGS: 00000286

2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RAX: 00000000674d4698 RBX: ffff9839c01d4750 RCX: 00000000cb4c0590

2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RDX: 000000002e01cfc1 RSI: 00000000674d4698 RDI: ffff9839c01d4750

2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RBP: ffff9839c2c7bcc0 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:11:03.169617+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:11:03.169617+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffffffffafc95cc0

2025-08-19T10:11:03.169619+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:11:03.169621+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:11:03.169621+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:11:03.169624+02:00 HN0VADM001 kernel:  netlink_unicast+0x130/0x3d0

2025-08-19T10:11:03.169624+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:11:03.169629+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:11:03.169629+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:11:31.169579+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [kauditd:28]

2025-08-19T10:11:31.169587+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:11:31.169612+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:11:31.169612+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:11:31.169613+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_unlock_irqrestore+0x19/0x40

2025-08-19T10:11:31.169613+02:00 HN0VADM001 kernel: Code: cc cc cc e9 d9 6a 3b 00 0f 1f 44 00 00 eb ed 66 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 <65> ff 0d d0 48 9d 52 74 05 c3 cc cc cc cc 0f 1f 44 00 00 c3 cc cc

2025-08-19T10:11:31.169617+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb0 EFLAGS: 00000206

2025-08-19T10:11:31.169617+02:00 HN0VADM001 kernel: RAX: dead000000000122 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:11:31.169619+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:11:31.169621+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:11:31.169622+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:11:31.169622+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel:  netlink_attachskb+0x104/0x2b0

2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:11:41.962221+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:11:41.962293+02:00 HN0VADM001 kernel: rcu:        1-....: (68261 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=34124

2025-08-19T10:11:41.962294+02:00 HN0VADM001 kernel:     (t=68262 jiffies g=11118153 q=13913 ncpus=2)

2025-08-19T10:11:41.962295+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:11:41.962295+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:11:41.962296+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_lock_irqsave+0x8/0x50

2025-08-19T10:11:41.962296+02:00 HN0VADM001 kernel: Code: 3d 3d e8 9c 52 e8 68 a3 6b ff 4c 29 e8 49 39 c6 73 d8 80 4d 00 04 eb 8e cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 53 9c 58 <0f> 1f 40 00 48 89 c3 fa 0f 1f 44 00 00 65 ff 05 64 49 9d 52 31 c0

2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bd88 EFLAGS: 00000246

2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RAX: 0000000000000246 RBX: ffffbb178010bdb8 RCX: ffff983aefc2a348

2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RDX: 0000000000034000 RSI: ffffbb178010bdb8 RDI: ffff983aefc2a340

2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a340 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:11:41.962304+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:11:41.962304+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:11:41.962306+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:11:41.962308+02:00 HN0VADM001 kernel:  remove_wait_queue+0x14/0x60

2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel:  netlink_attachskb+0x104/0x2b0

2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:11:41.962313+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:11:41.962313+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:11:41.962315+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:11:41.962317+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:12:07.169578+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 280s! [kauditd:28]

2025-08-19T10:12:07.169587+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:12:07.169588+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:12:07.169588+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:12:07.169609+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0x8b/0x3d0

2025-08-19T10:12:07.169609+02:00 HN0VADM001 kernel: Code: 07 48 8b 85 90 01 00 00 48 89 44 24 08 41 be 01 00 00 00 e9 86 00 00 00 4c 8d b8 80 00 00 00 44 89 f0 f0 0f c1 83 80 00 00 00 <85> c0 0f 84 3d 01 00 00 8d 50 01 09 c2 0f 88 1b 01 00 00 e8 0d 08

2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000206

2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RAX: 0000000000000002 RBX: ffff983aefc2a000 RCX: 0000000000000428

2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a428 RSI: ffffffffafc95cc0 RDI: ffff9839c0378000

2025-08-19T10:12:07.169611+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51

2025-08-19T10:12:07.169614+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:12:07.169614+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:12:07.169616+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:12:07.169618+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:12:07.169620+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:12:07.169620+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:12:07.169624+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:12:35.169582+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 306s! [kauditd:28]

2025-08-19T10:12:35.169625+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:12:35.169627+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:12:35.169627+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:12:35.169628+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:12:35.169628+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:12:35.169631+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:12:35.169633+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:12:35.169633+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:12:35.169639+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:12:35.169640+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:12:35.169644+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:12:35.169646+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:12:35.169646+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:12:35.169650+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:12:35.169650+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:12:44.974221+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:12:44.974256+02:00 HN0VADM001 kernel: rcu:        1-....: (84014 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=41999

2025-08-19T10:12:44.974257+02:00 HN0VADM001 kernel:     (t=84015 jiffies g=11118153 q=15612 ncpus=2)

2025-08-19T10:12:44.974257+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: RIP: 0010:sk_filter_trim_cap+0x36/0x250

2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: Code: 89 d5 41 54 55 48 89 fd 53 48 89 f3 48 83 ec 30 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 f6 46 7e 40 0f 85 54 01 00 00 <eb> 3c 48 89 de 48 89 ef e8 3d 5b c4 ff 41 89 c4 85 c0 74 56 48 8b

2025-08-19T10:12:44.974261+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bda8 EFLAGS: 00000246

2025-08-19T10:12:44.974262+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff9838c2702200 RCX: 0000000000000428

2025-08-19T10:12:44.974262+02:00 HN0VADM001 kernel: RDX: 0000000000000001 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a000 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51

2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: R13: 0000000000000001 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:12:44.974270+02:00 HN0VADM001 kernel:  ? netlink_attachskb+0x104/0x2b0

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  netlink_unicast+0xdb/0x3d0

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:12:44.974272+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:12:44.974272+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:12:44.974286+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:12:44.974287+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:12:44.974289+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:13:11.169603+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 339s! [kauditd:28]

2025-08-19T10:13:11.169613+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:13:11.169614+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:13:11.169614+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:13:11.169615+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x44/0x2b0

2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: Code: 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 48 c7 04 24 00 00 00 00 65 48 8b 04 25 80 fb 01 00 48 89 44 24 08 8b 86 d8 00 00 00 <48> c7 44 24 18 00 00 00 00 48 c7 44 24 20 00 00 00 00 89 c2 48 c7

2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246

2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: RAX: 0000000000000500 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: RDX: ffffbb178010be18 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:13:11.169628+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:13:11.169630+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:13:11.169632+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:13:11.169632+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:13:39.169605+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 365s! [kauditd:28]

2025-08-19T10:13:39.169615+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0x8b/0x3d0

2025-08-19T10:13:39.169619+02:00 HN0VADM001 kernel: Code: 07 48 8b 85 90 01 00 00 48 89 44 24 08 41 be 01 00 00 00 e9 86 00 00 00 4c 8d b8 80 00 00 00 44 89 f0 f0 0f c1 83 80 00 00 00 <85> c0 0f 84 3d 01 00 00 8d 50 01 09 c2 0f 88 1b 01 00 00 e8 0d 08

2025-08-19T10:13:39.169620+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000206

2025-08-19T10:13:39.169620+02:00 HN0VADM001 kernel: RAX: 0000000000000002 RBX: ffff983aefc2a000 RCX: 0000000000000428

2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a428 RSI: ffffffffafc95cc0 RDI: ffff9839c0378000

2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51

2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:13:39.169628+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:13:39.169628+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:13:39.169636+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:13:39.169636+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:13:39.169640+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:13:47.986167+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:13:47.986176+02:00 HN0VADM001 kernel: rcu:        1-....: (99767 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=49873

2025-08-19T10:13:47.986201+02:00 HN0VADM001 kernel:     (t=99768 jiffies g=11118153 q=16506 ncpus=2)

2025-08-19T10:13:47.986201+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x79/0x2b0

2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: Code: 44 24 20 00 00 00 00 89 c2 48 c7 44 24 10 c0 0d ce ac f0 0f c1 97 f0 00 00 00 01 d0 8b 96 d8 00 00 00 39 c2 0f 84 19 01 00 00 <8b> b7 18 01 00 00 39 f0 0f 82 0b 01 00 00 f0 29 93 f0 00 00 00 49

2025-08-19T10:13:47.986203+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000287

2025-08-19T10:13:47.986206+02:00 HN0VADM001 kernel: RAX: 0000000000034000 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:13:47.986206+02:00 HN0VADM001 kernel: RDX: 0000000000000500 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:13:47.986210+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:13:47.986210+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:13:47.986212+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:13:47.986212+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:13:47.986214+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:13:47.986216+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:13:47.986216+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:13:47.986219+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:13:47.986219+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:13:47.986220+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:13:47.986220+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:14:15.229595+02:00 HN0VADM001 kernel: kauditd_printk_skb: 1244 callbacks suppressed


Thomas Kloppholz
IT


experimenta gGmbH
Experimenta-Platz
74072 Heilbronn
Tel. +49 7131 88795 384
E-Mail:
thomas.kloppholz@experimenta.science
Web: https://www.experimenta.science

Informationspflicht zum Schutz Ihrer Daten:
Die Datenschutzhinweise beinhalten Angaben zur Verarbeitung personenbezogener Daten sowie Informationen zu Rechten und Pflichten unserer Besucher/-innen und Geschäftspartner.
Mehr Informationen:
https://www.experimenta.science/datenschutz
Sitz Heilbronn, Amtsgericht Stuttgart HRB 722941, Ust-IdNr. DE 26 47 48 920
Vorsitzende des Aufsichtsrates: Prof. Dr. Bärbel G. Renner
Geschäftsführung: Dr. Franziska Lang und Nico Wiest

Diese E-Mail ist nur für den benannten Empfänger bestimmt und kann Informationen enthalten, die vertraulich sind. Durch die Übersendung wird nicht auf die Rechte am Inhalt oder auf die Vertraulichkeit verzichtet. Bitte informieren Sie uns unverzüglich, wenn Sie diese E-Mail irrtümlich erhalten haben und löschen Sie die Nachricht. Vielen Dank. This e-mail is intended for the named recipient(s) only and may contain information that is privileged and confidential. Nothing in this e-mail is intended to constitute a waiver of any privilege or the confidentiality of this message. If you have received this e-mail in error, please notify us immediately by reply and delete this message. Thank you.



--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.1.148-1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1111017@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 26 Aug 2025 22:35:21 +0200
Source: linux
Architecture: source
Version: 6.1.148-1
Distribution: bookworm
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1040901 1108271 1111017
Changes:
 linux (6.1.148-1) bookworm; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.148
     - Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT
       (CVE-2025-38335)
     - regulator: core: fix NULL dereference on unbind due to stale coupling data
     - RDMA/core: Rate limit GID cache warning messages
     - iio: adc: ad7949: use spi_is_bpw_supported()
     - regmap: fix potential memory leak of regmap_bus
     - [x86] hyperv: Fix usage of cpu_online_mask to get valid cpu
     - [arm64,armhf] staging: vc04_services: Drop VCHIQ_SUCCESS usage
     - [arm64,armhf] staging: vc04_services: Drop VCHIQ_ERROR usage
     - [arm64,armhf] staging: vc04_services: Drop VCHIQ_RETRY usage
     - [arm64,armhf] staging: vchiq_arm: Make vchiq_shutdown never fail
     - xfrm: interface: fix use-after-free after changing collect_md xfrm
       interface (CVE-2025-38500)
     - net/mlx5: Fix memory leak in cmd_exec()
     - i40e: Add rx_missed_errors for buffer exhaustion
     - i40e: report VF tx_dropped with tx_errors instead of tx_discards
     - i40e: When removing VF MAC filters, only check PF-set MAC
     - net: appletalk: Fix use-after-free in AARP proxy probe
     - can: dev: can_restart(): reverse logic to remove need for goto
     - can: dev: can_restart(): move debug message and stats after successful
       restart
     - can: netlink: can_changelink(): fix NULL pointer deref of struct
       can_priv::do_set_mode
     - [arm64] drm/bridge: ti-sn65dsi86: Remove extra semicolon in
       ti_sn_bridge_probe()
     - [arm64] net: hns3: fix concurrent setting vlan filter issue
     - [arm64] net: hns3: disable interrupt when ptp init failed
     - [arm64] net: hns3: fixed vf get max channels bug
     - [x86] platform/x86: ideapad-laptop: Fix kbd backlight not remembered among
       boots
     - i2c: qup: jump out of the loop in case of timeout
     - i2c: tegra: Fix reset error handling with ACPI
     - i2c: virtio: Avoid hang by using interruptible completion wait
     - bus: fsl-mc: Fix potential double device reference in
       fsl_mc_get_endpoint()
     - ALSA: hda/realtek - Add mute LED support for HP Pavilion 15-eg0xxx
     - [arm64] dpaa2-eth: Fix device reference count leak in MAC endpoint
       handling
     - e1000e: disregard NVM checksum on tgp when valid checksum bit is not set
     - e1000e: ignore uninitialized checksum word on tgp
     - gve: Fix stuck TX queue for DQ queue format
     - ice: Fix a null pointer dereference in ice_copy_and_init_pkg()
     - nilfs2: reject invalid file types when reading inodes
     - mm/zsmalloc: do not pass __GFP_MOVABLE if CONFIG_COMPACTION=n
     - drm/amdkfd: Don't call mmput from MMU notifier callback
     - usb: typec: tcpm: allow to use sink in accessory mode
     - usb: typec: tcpm: allow switching to mode accessory to mux properly
     - usb: typec: tcpm: apply vbus before data bringup in tcpm_src_attach
     - jfs: reject on-disk inodes of an unsupported type (CVE-2025-37925)
     - [x86] comedi: comedi_test: Fix possible deletion of uninitialized timers
     - ALSA: hda/tegra: Add Tegra264 support
     - ALSA: hda: Add missing NVIDIA HDA codec IDs
     - [x86] drm/i915/dp: Fix 2.7 Gbps DP_LINK_BW value on g4x
     - mm: khugepaged: fix call hpage_collapse_scan_file() for anonymous vma
     - erofs: get rid of debug_one_dentry()
     - erofs: sunset erofs_dbg()
     - erofs: drop z_erofs_page_mark_eio()
     - erofs: simplify z_erofs_transform_plain()
     - erofs: address D-cache aliasing
     - usb: chipidea: add USB PHY event
     - usb: phy: mxs: disconnect line when USB charger is attached
     - ethernet: intel: fix building with large NR_CPUS
     - [x86] ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx
     - ASoC: Intel: fix SND_SOC_SOF dependencies
     - fs_context: fix parameter name in infofc() macro
     - ublk: use vmalloc for ublk_device's __queues
     - hfsplus: remove mutex_lock check in hfsplus_free_extents
     - ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask()
     - ASoC: ops: dynamically allocate struct snd_ctl_elem_value
     - soc: qcom: QMI encoding/decoding for big endian
     - [arm64] dts: qcom: sdm845: Expand IMEM region
     - [arm64] dts: qcom: sc7180: Expand IMEM region
     - [arm64,armhf] usb: host: xhci-plat: fix incorrect type for of_match
       variable in xhci_plat_probe()
     - usb: misc: apple-mfi-fastcharge: Make power supply names unique
     - vmci: Prevent the dispatching of uninitialized payloads
     - pps: fix poll support
     - Revert "vmci: Prevent the dispatching of uninitialized payloads"
     - powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()
     - usb: early: xhci-dbc: Fix early_ioremap leak
     - [armhf] dts: ti: omap: Fixup pinheader typo
     - [arm64] dts: imx8mm-beacon: Fix HS400 USDHC clock speed
     - [arm64] dts: imx8mn-beacon: Fix HS400 USDHC clock speed
     - PM / devfreq: Check governor before using governor->name
     - cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode
     - cpufreq: Initialize cpufreq-based frequency-invariance later
     - cpufreq: Init policy->rwsem before it may be possibly used
     - [arm64,armhf] drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed
     - bpf, sockmap: Fix psock incorrectly pointing to sk
     - bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
     - net: ipv6: ip6mr: Fix in/out netdev to pass to the FORWARD chain
     - bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure
     - wifi: rtl818x: Kill URBs before clearing tx status queue
     - wifi: iwlwifi: Fix memory leak in iwl_mvm_init()
     - iwlwifi: Add missing check for alloc_ordered_workqueue
     - wifi: ath11k: clear initialized flag for deinit-ed srng lists
     - tcp: fix tcp_ofo_queue() to avoid including too much DUP SACK range
     - net/mlx5: Check device memory pointer before usage
     - drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value
     - fbcon: Fix outdated registered_fb reference in comment
     - netfilter: nf_tables: adjust lockdep assertions handling
     - net/sched: Restrict conditions for adding duplicating netems to qdisc tree
     - net_sched: act_ctinfo: use atomic64_t for three counters
     - xen/gntdev: remove struct gntdev_copy_batch from stack
     - wifi: rtl8xxxu: Fix RX skb size for aggregation disabled
     - mwl8k: Add missing check after DMA map
     - wifi: mac80211: reject TDLS operations when station is not associated
     - wifi: plfxlc: Fix error handling in usb driver probe
     - wifi: mac80211: Do not schedule stopped TXQs
     - wifi: mac80211: Don't call fq_flow_idx() for management frames
     - wifi: mac80211: Check 802.11 encaps offloading in
       ieee80211_tx_h_select_key()
     - Reapply "wifi: mac80211: Update skb's control block key in
       ieee80211_tx_dequeue()"
     - wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P
       IE
     - can: peak_usb: fix USB FD devices potential malfunction
     - can: kvaser_pciefd: Store device channel index
     - can: kvaser_usb: Assign netdev.dev_port based on device channel index
     - netfilter: xt_nfacct: don't assume acct name is null-terminated
     - vrf: Drop existing dst reference in vrf_ip6_input_dst
     - ipv6: prevent infinite loop in rt6_nlmsg_size()
     - ipv6: fix possible infinite loop in fib6_info_uses_dev()
     - ipv6: annotate data-races around rt->fib6_nsiblings
     - bpf/preload: Don't select USERMODE_DRIVER
     - PCI: rockchip-host: Fix "Unexpected Completion" log message
     - [arm64] crypto: sun8i-ce - fix nents passed to dma_unmap_sg()
     - [arm*] crypto: marvell/cesa - Fix engine load inaccuracy
     - mtd: fix possible integer overflow in erase_xfer()
     - media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check
     - power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
     - power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set
     - PCI: endpoint: pci-epf-vntb: Return -ENOENT if pci_epc_get_next_free_bar()
       fails
     - [arm64,armhf] pinctrl: sunxi: Fix memory leak on krealloc failure
     - perf sched: Fix memory leaks for evsel->priv in timehist
     - perf sched: Fix memory leaks in 'perf sched latency'
     - [arm64] crypto: inside-secure - Fix `dma_unmap_sg()` nents value
     - crypto: ccp - Fix crash when rebind ccp device for ccp.ko
     - [arm64] RDMA/hns: Fix -Wframe-larger-than issue
     - kernel: trace: preemptirq_delay_test: use offstack cpu mask
     - proc: use the same treatment to check proc_lseek as ones for
       proc_read_iter et.al
     - perf tests bp_account: Fix leaked file descriptor
     - [armhf] clk: sunxi-ng: v3s: Fix de clock definition
     - [ppc64el] scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value
     - scsi: elx: efct: Fix dma_unmap_sg() nents value
     - scsi: mvsas: Fix dma_unmap_sg() nents value
     - scsi: isci: Fix dma_unmap_sg() nents value
     - soundwire: stream: restore params when prepare ports fail
     - PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute
     - fs/orangefs: Allow 2 more characters in do_c_string()
     - dmaengine: mv_xor: Fix missing check after DMA map and missing unmap
     - [x86] crypto: qat - fix seq_file position update in adf_ring_next()
     - fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
     - jfs: fix metapage reference count leak in dbAllocCtl
     - vhost-scsi: Fix log flooding with target does not exist errors
     - bpf: Check flow_dissector ctx accesses are aligned
     - apparmor: ensure WB_HISTORY_SIZE value is a power of 2
     - module: Restore the moduleparam prefix length check
     - ucount: fix atomic_long_inc_below() argument type
     - rtc: ds1307: fix incorrect maximum clock rate handling
     - rtc: hym8563: fix incorrect maximum clock rate handling
     - rtc: nct3018y: fix incorrect maximum clock rate handling
     - rtc: pcf85063: fix incorrect maximum clock rate handling
     - rtc: pcf8563: fix incorrect maximum clock rate handling
     - rtc: rv3028: fix incorrect maximum clock rate handling
     - f2fs: fix KMSAN uninit-value in extent_info usage
     - f2fs: doc: fix wrong quota mount option description
     - f2fs: fix to avoid UAF in f2fs_sync_inode_meta()
     - f2fs: fix to avoid panic in f2fs_evict_inode
     - f2fs: fix to avoid out-of-boundary access in devs.path
     - f2fs: vm_unmap_ram() may be called from an invalid context
     - f2fs: fix to update upper_p in __get_secs_required() correctly
     - f2fs: fix to calculate dirty data during has_not_enough_free_secs()
     - vfio/pci: Separate SR-IOV VF dev_set
     - scsi: mpt3sas: Fix a fw_event memory leak
     - scsi: Revert "scsi: iscsi: Fix HW conn removal use after free"
     - scsi: ufs: core: Use link recovery when h8 exit fails during runtime
       resume
     - scsi: sd: Make sd shutdown issue START STOP UNIT appropriately
     - PCI: pnv_php: Clean up allocated IRQs on unplug
     - PCI: pnv_php: Work around switches with broken presence detection
     - [powerpc*] eeh: Export eeh_unfreeze_pe()
     - [powerpc*] eeh: Rely on dev->link_active_reporting
     - [powerpc*] eeh: Make EEH driver device hotplug safe
     - PCI: pnv_php: Fix surprise plug detection and recovery
     - pNFS/flexfiles: don't attempt pnfs on fatal DS errors
     - sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up()
     - NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate()
     - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
     - NFSv4.2: another fix for listxattr
     - NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY
     - netpoll: prevent hanging NAPI when netcons gets enabled
     - phy: mscc: Fix parsing of unicast frames
     - pptp: ensure minimal skb length in pptp_xmit()
     - net/mlx5: Correctly set gso_segs when LRO is used
     - ipv6: reject malicious packets in ipv6_gso_segment()
     - net: drop UFO packets in udp_rcv_segment()
     - benet: fix BUG when creating VFs
     - irqchip: Build IMX_MU_MSI only on ARM
     - ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()
     - smb: server: remove separate empty_recvmsg_queue
     - smb: server: make sure we call ib_dma_unmap_single() only if we called
       ib_dma_map_single already
     - smb: server: let recv_done() consistently call
       put_recvmsg/smb_direct_disconnect_rdma_connection
     - smb: server: let recv_done() avoid touching data_transfer after
       cleanup/move
     - smb: client: let recv_done() cleanup before notifying the callers.
     - pptp: fix pptp_xmit() error path
     - perf/core: Don't leak AUX buffer refcount on allocation failure
     - perf/core: Exit early on perf_mmap() fail
     - perf/core: Prevent VMA split of buffer mappings
     - net/packet: fix a race in packet_set_ring() and packet_notifier()
     - vsock: Do not allow binding to VMADDR_PORT_ANY
     - ksmbd: fix null pointer dereference error in generate_encryptionkey
     - ksmbd: fix Preauh_HashValue race condition
     - ksmbd: fix corrupted mtime and ctime in smb2_open
     - ksmbd: limit repeated connections from clients with the same IP
       (CVE-2025-38501)
     - smb: server: Fix extension string in ksmbd_extract_shortname()
     - USB: serial: option: add Foxconn T99W709
     - net: usbnet: Avoid potential RCU stall on LINK_CHANGE event
     - net: usbnet: Fix the wrong netif_carrier_on() call
     - [x86] sev: Evict cache lines during SNP memory validation (CVE-2024-36331)
     - ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe()
     - ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx()
     - [x86] fpu: Delay instruction pointer fixup until after warning
     - [mips*] mm: tlb-r4k: Uniquify TLB entries on init
     - mm/hmm: move pmd_to_hmm_pfn_flags() to the respective #ifdeffery
     - usb: gadget : fix use-after-free in composite_dev_cleanup()
 .
   [ Bastian Blank ]
   * Drop not needed extra step to add debug links
   * Sign modules using an ephemeral key: (closes: #1040901)
     - Set MODULE_SIG_ALL to sign all modules.
     - Not longer request Secure Boot signing for modules.
     - Don't trust Secure Boot key any longer.
   * Store build time signing key encrypted.
   * Sign modules and support lockdown always.
 .
   [ Ben Hutchings ]
   * d/b/buildcheck.py, d/rules.real: Run buildcheck.py in setup as well
   * d/b/buildcheck.py: Check config of kernel to be signed
   * d/rules: Include target suite as an input to gencontrol.py
   * Generate kernel ABI name suffix automatically if not configured
   * Delete ABI name suffix and ABI reference
   * d/salsa-ci.yml: Ignore pycodestyle error E241
   * d/rules.real: Move module installation to the image build rule
   * proc: fix missing pde_set_flags() for net proc files
 .
   [ Salvatore Bonaccorso ]
   * [amd64] udeb: kernel-image: Include SPI drivers
   * netlink: avoid infinite retry looping in netlink_unicast()
     (Closes: #1111017)
   * ext4: don't try to clear the orphan_present feature block device is r/o
     (Closes: #1108271)
Checksums-Sha1:
 1a4e677f41561bf447715cd471bc75788b4c1fc7 290931 linux_6.1.148-1.dsc
 cc541c6b526646bedb8e32d7f99cbbd5b9d59279 137839088 linux_6.1.148.orig.tar.xz
 158122141e16655b13035b7f555d8a9be3ecd668 1772788 linux_6.1.148-1.debian.tar.xz
 9f3859e2ace55c1a8bb3f8b79be6a00af61b7815 6710 linux_6.1.148-1_source.buildinfo
Checksums-Sha256:
 e07ffbf994ed914c1cb121575aa4fa72d1ea1ace46a7bbca8a051e334b399c8a 290931 linux_6.1.148-1.dsc
 8c9ebc48cf0b303b2027edea6057c133d29f6a996162b2f52f1bfb15a587f7ff 137839088 linux_6.1.148.orig.tar.xz
 03559b2fb3cbb579485cfe0640408a917397fab265091bec672e91ce665b1680 1772788 linux_6.1.148-1.debian.tar.xz
 4bc4c911e0062a5bf75ef6dd3d63af886b9ab9dbf402b35d63e05d46d31d8bf5 6710 linux_6.1.148-1_source.buildinfo
Files:
 1879118d6060fcf898cb7cdd810b6316 290931 kernel optional linux_6.1.148-1.dsc
 56c58a5eda9c8c0d65555ed0613a0f98 137839088 kernel optional linux_6.1.148.orig.tar.xz
 48035d655854e66cfebdef63fa9c77eb 1772788 kernel optional linux_6.1.148-1.debian.tar.xz
 b3c818ddaf6f1145cae0abfa0bebe6c5 6710 kernel optional linux_6.1.148-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=lwgi
-----END PGP SIGNATURE-----

Attachment: pgp3hsefg8fk8.pgp
Description: PGP signature


--- End Message ---

Reply to: