[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1111538: marked as done (Kernel 6.1.0.38-amd64 soft lockup on vmware )



Your message dated Thu, 28 Aug 2025 18:17:08 +0000
with message-id <E1urhBM-00HQ5W-2Z@fasolo.debian.org>
and subject line Bug#1111017: fixed in linux 6.12.43-1
has caused the Debian Bug report #1111017,
regarding Kernel 6.1.0.38-amd64 soft lockup on vmware 
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
1111017: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111017
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---

Package: linux-image-6.1.0-38-amd64

Version: 6.1.0.38-amd64

 

The vm’s on VMware ESX hosts got stuck after we update our Farm to linux-image-6.1.0-38-amd64

 

Our workaround is to downgrade to linux-image-6.1.0-37-amd64 and set linux-image as marked on hold.

 

 

 

The Kernel Log shows this:

 

25-08-19T10:07:29.913807+02:00 HN0VADM001 kernel:     (t=5250 jiffies g=11118153 q=4273 ncpus=2)

2025-08-19T10:07:29.913808+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Not tainted 6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:07:29.913808+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:07:29.913809+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0xbb/0x2b0

2025-08-19T10:07:29.913809+02:00 HN0VADM001 kernel: Code: 24 00 0f 84 9d 01 00 00 65 48 8b 04 25 80 fb 01 00 c7 40 18 01 00 00 00 4c 8d ab 40 03 00 00 48 89 e6 4c 89 ef e8 85 dc 8b ff <8b> 83 f0 00 00 00 85 c0 0f 84 ac 00 00 00 8b 93 18 01 00 00 03 85

2025-08-19T10:07:29.913811+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246

2025-08-19T10:07:29.913811+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:07:29.913812+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:07:29.913812+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:07:29.913813+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:07:29.913813+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:07:29.913814+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:07:29.913815+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:07:29.913816+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:07:29.913816+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:07:29.913817+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:07:29.913818+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:07:29.913818+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:07:29.913819+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:07:29.913820+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:07:29.913821+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:07:29.913821+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:07:29.913822+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:07:55.169588+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 45s! [kauditd:28]

2025-08-19T10:07:55.169598+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:07:55.169609+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Not tainted 6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:07:55.169609+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:07:55.169610+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:07:55.169610+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:07:55.169612+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:07:55.169612+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:07:55.169613+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:07:55.169614+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:07:55.169615+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:07:55.169615+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:07:55.169616+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:07:55.169617+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:07:55.169617+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:07:55.169619+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:07:55.169620+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:07:55.169620+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:07:55.169621+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:07:55.169622+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:08:23.169574+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 71s! [kauditd:28]

2025-08-19T10:08:23.169583+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:08:23.169595+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:08:23.169595+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:08:23.169596+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_lock_irqsave+0x8/0x50

2025-08-19T10:08:23.169596+02:00 HN0VADM001 kernel: Code: 3d 3d e8 9c 52 e8 68 a3 6b ff 4c 29 e8 49 39 c6 73 d8 80 4d 00 04 eb 8e cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 53 9c 58 <0f> 1f 40 00 48 89 c3 fa 0f 1f 44 00 00 65 ff 05 64 49 9d 52 31 c0

2025-08-19T10:08:23.169598+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bd70 EFLAGS: 00000246

2025-08-19T10:08:23.169598+02:00 HN0VADM001 kernel: RAX: 0000000000000246 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: RDX: 0000000000000500 RSI: ffffbb178010bdb8 RDI: ffff983aefc2a340

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010bdb8

2025-08-19T10:08:23.169599+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:08:23.169601+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:08:23.169601+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:08:23.169602+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:08:23.169603+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:08:23.169603+02:00 HN0VADM001 kernel:  add_wait_queue+0x1d/0xa0

2025-08-19T10:08:23.169604+02:00 HN0VADM001 kernel:  netlink_attachskb+0xbb/0x2b0

2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:08:23.169605+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:08:23.169606+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:08:23.169606+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:08:23.169607+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:08:23.169607+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:08:23.169608+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:08:23.169609+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:08:23.169613+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:08:32.925675+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:08:32.925684+02:00 HN0VADM001 kernel: rcu:        1-....: (21002 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=10498

2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel:     (t=21003 jiffies g=11118153 q=9624 ncpus=2)

2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:08:32.925685+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:08:32.925695+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x69/0x2b0

2025-08-19T10:08:32.925695+02:00 HN0VADM001 kernel: Code: 86 d8 00 00 00 48 c7 44 24 18 00 00 00 00 48 c7 44 24 20 00 00 00 00 89 c2 48 c7 44 24 10 c0 0d ce ac f0 0f c1 97 f0 00 00 00 <01> d0 8b 96 d8 00 00 00 39 c2 0f 84 19 01 00 00 8b b7 18 01 00 00

2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000206

2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RAX: 0000000000000500 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:08:32.925696+02:00 HN0VADM001 kernel: RDX: 0000000000033b00 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:08:32.925697+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:08:32.925697+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:08:32.925699+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:08:32.925700+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:08:32.925702+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:08:32.925703+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:08:32.925705+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:08:32.925706+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:08:59.169598+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 105s! [kauditd:28]

2025-08-19T10:08:59.169611+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:08:59.169612+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:08:59.169613+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:08:59.169615+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:08:59.169615+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:08:59.169616+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:08:59.169618+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:08:59.169618+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:08:59.169619+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:08:59.169620+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:08:59.169621+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:08:59.169622+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:08:59.169623+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:08:59.169623+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:08:59.169624+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:08:59.169625+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:08:59.169626+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:27.169594+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 131s! [kauditd:28]

2025-08-19T10:09:27.169603+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:09:27.169604+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:09:27.169604+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:09:27.169606+02:00 HN0VADM001 kernel: RIP: 0010:sk_filter_trim_cap+0x12b/0x250

2025-08-19T10:09:27.169607+02:00 HN0VADM001 kernel: Code: 0a 01 00 00 e8 86 2a 8e ff 4c 89 73 18 45 85 ff 74 1d 45 39 fd 44 89 fe 41 0f 43 f5 3b 73 70 0f 82 8f 00 00 00 e8 55 93 93 ff <e9> 1a ff ff ff 41 bc ff ff ff ff e8 45 93 93 ff e9 0a ff ff ff e8

2025-08-19T10:09:27.169607+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bda8 EFLAGS: 00000246

2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff9838c2702200 RCX: 0000000000000000

2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RDX: ffff9839c0378000 RSI: ffff9838c2702200 RDI: ffff9839c0378000

2025-08-19T10:09:27.169608+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a000 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: 0000000000000000

2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: R13: 0000000000000001 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:09:27.169610+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:09:27.169611+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:09:27.169612+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:27.169613+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:27.169613+02:00 HN0VADM001 kernel:  ? netlink_attachskb+0x104/0x2b0

2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel:  netlink_unicast+0xdb/0x3d0

2025-08-19T10:09:27.169614+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:09:27.169615+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:09:27.169616+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:09:27.169616+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:27.169617+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:27.169618+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:27.169619+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:35.937663+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:09:35.937671+02:00 HN0VADM001 kernel: rcu:        1-....: (36755 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=18372

2025-08-19T10:09:35.937672+02:00 HN0VADM001 kernel:     (t=36756 jiffies g=11118153 q=10925 ncpus=2)

2025-08-19T10:09:35.937673+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:09:35.937673+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:09:35.937683+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_unlock_irqrestore+0x20/0x40

2025-08-19T10:09:35.937684+02:00 HN0VADM001 kernel: Code: 00 0f 1f 44 00 00 eb ed 66 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 65 ff 0d d0 48 9d 52 <74> 05 c3 cc cc cc cc 0f 1f 44 00 00 c3 cc cc cc cc 66 66 2e 0f 1f

2025-08-19T10:09:35.937684+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb0 EFLAGS: 00000246

2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:09:35.937685+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:09:35.937705+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:09:35.937706+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:09:35.937706+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:09:35.937707+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:09:35.937718+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel:  netlink_attachskb+0xbb/0x2b0

2025-08-19T10:09:35.937719+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:09:35.937720+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:09:35.937720+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:09:35.937722+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:09:35.937724+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:35.937725+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:35.937728+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:35.937728+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567659+02:00 HN0VADM001 kernel: INFO: task khugepaged:36 blocked for more than 120 seconds.

2025-08-19T10:09:59.567668+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567669+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567669+02:00 HN0VADM001 kernel: task:khugepaged      state:D stack:0     pid:36    ppid:2      flags:0x00004000

2025-08-19T10:09:59.567689+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567690+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel:  schedule_timeout+0x118/0x150

2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel:  wait_for_completion+0x86/0x160

2025-08-19T10:09:59.567691+02:00 HN0VADM001 kernel:  __flush_work.isra.0+0x173/0x280

2025-08-19T10:09:59.567694+02:00 HN0VADM001 kernel:  ? flush_workqueue_prep_pwqs+0x110/0x110

2025-08-19T10:09:59.567694+02:00 HN0VADM001 kernel:  __lru_add_drain_all+0x147/0x1f0

2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel:  khugepaged+0x63/0x970

2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:59.567695+02:00 HN0VADM001 kernel:  ? collapse_pte_mapped_thp+0x5d0/0x5d0

2025-08-19T10:09:59.567696+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567698+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567699+02:00 HN0VADM001 kernel: INFO: task jbd2/sda3-8:215 blocked for more than 120 seconds.

2025-08-19T10:09:59.567700+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567700+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567701+02:00 HN0VADM001 kernel: task:jbd2/sda3-8     state:D stack:0     pid:215   ppid:2      flags:0x00004000

2025-08-19T10:09:59.567703+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567703+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567704+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567705+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567707+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567707+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  jbd2_journal_commit_transaction+0x119d/0x1a50 [jbd2]

2025-08-19T10:09:59.567708+02:00 HN0VADM001 kernel:  ? psi_task_switch+0xf7/0x1f0

2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel:  ? finish_task_switch.isra.0+0x90/0x2d0

2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel:  kjournald2+0xa9/0x280 [jbd2]

2025-08-19T10:09:59.567711+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel:  ? jbd2_fc_wait_bufs+0xa0/0xa0 [jbd2]

2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567712+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567713+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567715+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: INFO: task ir_agent:2750268 blocked for more than 120 seconds.

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567716+02:00 HN0VADM001 kernel: task:ir_agent        state:D stack:0     pid:2750268 ppid:650    flags:0x00000002

2025-08-19T10:09:59.567717+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567719+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567720+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567721+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567722+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567724+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567725+02:00 HN0VADM001 kernel:  ext4_reserve_inode_write+0x5d/0xb0 [ext4]

2025-08-19T10:09:59.567731+02:00 HN0VADM001 kernel:  __ext4_mark_inode_dirty+0x74/0x240 [ext4]

2025-08-19T10:09:59.567732+02:00 HN0VADM001 kernel:  ? __ext4_journal_start_sb+0x105/0x120 [ext4]

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  ext4_dirty_inode+0x56/0x80 [ext4]

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  __mark_inode_dirty+0x56/0x380

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  generic_update_time+0x78/0xc0

2025-08-19T10:09:59.567733+02:00 HN0VADM001 kernel:  file_modified_flags+0xda/0x100

2025-08-19T10:09:59.567736+02:00 HN0VADM001 kernel:  ext4_buffered_write_iter+0x55/0x140 [ext4]

2025-08-19T10:09:59.567736+02:00 HN0VADM001 kernel:  vfs_write+0x232/0x3f0

2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel:  ksys_write+0x6b/0xf0

2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.567737+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567738+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567738+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.567744+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.567745+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567746+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567746+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567749+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RIP: 0033:0x7f8d707cd33f

2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RSP: 002b:00007f8d22ff4160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001

2025-08-19T10:09:59.567750+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 0000000000000057 RCX: 00007f8d707cd33f

2025-08-19T10:09:59.567751+02:00 HN0VADM001 kernel: RDX: 0000000000000057 RSI: 00007f8d4c053290 RDI: 0000000000000003

2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: RBP: 00007f8d22ff5630 R08: 0000000000000000 R09: 0000000000977de0

2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: R10: 000000000018c1c3 R11: 0000000000000293 R12: 00000000388b9a10

2025-08-19T10:09:59.567753+02:00 HN0VADM001 kernel: R13: 00007f8d4c053290 R14: 0000000000000003 R15: 00007f8d48006820

2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel: INFO: task wdavdaemon:2561488 blocked for more than 120 seconds.

2025-08-19T10:09:59.567754+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567761+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567762+02:00 HN0VADM001 kernel: task:wdavdaemon      state:D stack:0     pid:2561488 ppid:2561477 flags:0x00000002

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567763+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567766+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567766+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567767+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567768+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567772+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567773+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  ext4_reserve_inode_write+0x5d/0xb0 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  __ext4_mark_inode_dirty+0x74/0x240 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  ? __ext4_journal_start_sb+0x105/0x120 [ext4]

2025-08-19T10:09:59.567774+02:00 HN0VADM001 kernel:  ext4_dirty_inode+0x56/0x80 [ext4]

2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel:  __mark_inode_dirty+0x56/0x380

2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel:  generic_update_time+0x78/0xc0

2025-08-19T10:09:59.567777+02:00 HN0VADM001 kernel:  file_modified_flags+0xda/0x100

2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel:  ext4_buffered_write_iter+0x55/0x140 [ext4]

2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel:  vfs_write+0x232/0x3f0

2025-08-19T10:09:59.567778+02:00 HN0VADM001 kernel:  ksys_write+0x6b/0xf0

2025-08-19T10:09:59.567779+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.567781+02:00 HN0VADM001 kernel:  ? wake_bit_function+0x4b/0x70

2025-08-19T10:09:59.567781+02:00 HN0VADM001 kernel:  ? __wake_up_common+0x76/0x180

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? __slab_free+0xbf/0x2d0

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? __slab_free+0xbf/0x2d0

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? sched_clock_cpu+0x9/0xb0

2025-08-19T10:09:59.567782+02:00 HN0VADM001 kernel:  ? psi_group_change+0x152/0x370

2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel:  ? save_fpregs_to_fpstate+0x39/0x90

2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel:  ? __rseq_handle_notify_resume+0xa9/0x4a0

2025-08-19T10:09:59.567785+02:00 HN0VADM001 kernel:  ? finish_task_switch.isra.0+0x90/0x2d0

2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel:  ? restore_fpregs_from_fpstate+0x38/0x90

2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel:  ? switch_fpu_return+0x4c/0xd0

2025-08-19T10:09:59.567786+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567788+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567789+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: RIP: 0033:0x7fd3d031733f

2025-08-19T10:09:59.567790+02:00 HN0VADM001 kernel: RSP: 002b:00007fd3bc7edf50 EFLAGS: 00000293 ORIG_RAX: 0000000000000001

2025-08-19T10:09:59.567795+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 0000000000000070 RCX: 00007fd3d031733f

2025-08-19T10:09:59.567796+02:00 HN0VADM001 kernel: RDX: 0000000000000070 RSI: 000056358e0018b0 RDI: 0000000000000017

2025-08-19T10:09:59.567796+02:00 HN0VADM001 kernel: RBP: 000056358e0018b0 R08: 0000000000000000 R09: 0000000000000044

2025-08-19T10:09:59.567797+02:00 HN0VADM001 kernel: R10: 0000000000260308 R11: 0000000000000293 R12: 0000000000000070

2025-08-19T10:09:59.567831+02:00 HN0VADM001 kernel: R13: 000056358e0a9a40 R14: 0000000000000070 R15: 00007fd3d03ed9e0

2025-08-19T10:09:59.567832+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567837+02:00 HN0VADM001 kernel: INFO: task kworker/u4:3:2732080 blocked for more than 120 seconds.

2025-08-19T10:09:59.567838+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567838+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: task:kworker/u4:3    state:D stack:0     pid:2732080 ppid:2      flags:0x00004000

2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0)

2025-08-19T10:09:59.567839+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567840+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567842+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567843+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567848+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567849+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567850+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567850+02:00 HN0VADM001 kernel:  ? ext4_get_group_desc+0x5a/0xf0 [ext4]

2025-08-19T10:09:59.567852+02:00 HN0VADM001 kernel:  ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4]

2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel:  ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4]

2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel:  ext4_mb_new_blocks+0x4d4/0x11f0 [ext4]

2025-08-19T10:09:59.567853+02:00 HN0VADM001 kernel:  ? ext4_find_extent+0x1a2/0x430 [ext4]

2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel:  ext4_ext_map_blocks+0x66a/0x19b0 [ext4]

2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel:  ? release_pages+0x159/0x470

2025-08-19T10:09:59.567854+02:00 HN0VADM001 kernel:  ? find_get_pages_range_tag+0x1a9/0x200

2025-08-19T10:09:59.567859+02:00 HN0VADM001 kernel:  ? __pagevec_release+0x1b/0x60

2025-08-19T10:09:59.567860+02:00 HN0VADM001 kernel:  ext4_map_blocks+0x1b6/0x5f0 [ext4]

2025-08-19T10:09:59.567860+02:00 HN0VADM001 kernel:  ext4_writepages+0x8a0/0x11e0 [ext4]

2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel:  ? ext4_inode_csum+0x20b/0x290 [ext4]

2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel:  do_writepages+0xbd/0x1c0

2025-08-19T10:09:59.567861+02:00 HN0VADM001 kernel:  ? find_busiest_group+0x41/0x370

2025-08-19T10:09:59.567866+02:00 HN0VADM001 kernel:  __writeback_single_inode+0x3d/0x360

2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel:  writeback_sb_inodes+0x1f5/0x4d0

2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel:  __writeback_inodes_wb+0x4c/0xf0

2025-08-19T10:09:59.567867+02:00 HN0VADM001 kernel:  wb_writeback+0x204/0x2f0

2025-08-19T10:09:59.567868+02:00 HN0VADM001 kernel:  wb_workfn+0x350/0x4f0

2025-08-19T10:09:59.567868+02:00 HN0VADM001 kernel:  process_one_work+0x1c7/0x380

2025-08-19T10:09:59.567869+02:00 HN0VADM001 kernel:  worker_thread+0x4d/0x380

2025-08-19T10:09:59.567873+02:00 HN0VADM001 kernel:  ? rescuer_thread+0x3a0/0x3a0

2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567874+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567875+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567875+02:00 HN0VADM001 kernel: INFO: task systemd-journal:2739475 blocked for more than 120 seconds.

2025-08-19T10:09:59.567878+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567878+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: task:systemd-journal state:D stack:0     pid:2739475 ppid:1      flags:0x00000002

2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567879+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567880+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567882+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567882+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567883+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567884+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567886+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567886+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  ext4_reserve_inode_write+0x5d/0xb0 [ext4]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  ext4_orphan_add+0x295/0x530 [ext4]

2025-08-19T10:09:59.567887+02:00 HN0VADM001 kernel:  ? jbd2__journal_start+0xf8/0x1e0 [jbd2]

2025-08-19T10:09:59.567892+02:00 HN0VADM001 kernel:  ext4_truncate+0x19e/0x490 [ext4]

2025-08-19T10:09:59.567893+02:00 HN0VADM001 kernel:  ext4_setattr+0x8db/0xb50 [ext4]

2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel:  notify_change+0x2ad/0x5c0

2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel:  ? do_truncate+0x94/0xe0

2025-08-19T10:09:59.567894+02:00 HN0VADM001 kernel:  do_truncate+0x94/0xe0

2025-08-19T10:09:59.567895+02:00 HN0VADM001 kernel:  do_sys_ftruncate+0x150/0x1a0

2025-08-19T10:09:59.567896+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.567897+02:00 HN0VADM001 kernel:  ? __seccomp_filter+0x32a/0x4e0

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.567898+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.567899+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.567903+02:00 HN0VADM001 kernel:  ? __mod_lruvec_page_state+0x93/0x140

2025-08-19T10:09:59.567904+02:00 HN0VADM001 kernel:  ? page_add_file_rmap+0x178/0x2f0

2025-08-19T10:09:59.567904+02:00 HN0VADM001 kernel:  ? balance_dirty_pages_ratelimited_flags+0x12f/0x380

2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel:  ? fault_dirty_shared_page+0x9a/0x110

2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel:  ? do_fault+0x2f7/0x410

2025-08-19T10:09:59.567905+02:00 HN0VADM001 kernel:  ? __handle_mm_fault+0x660/0xfa0

2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel:  ? __seccomp_filter+0x32a/0x4e0

2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel:  ? audit_filter_inodes.part.0+0x2e/0x120

2025-08-19T10:09:59.567908+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.567909+02:00 HN0VADM001 kernel:  ? handle_mm_fault+0xdb/0x2d0

2025-08-19T10:09:59.567912+02:00 HN0VADM001 kernel:  ? do_user_addr_fault+0x191/0x550

2025-08-19T10:09:59.567912+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567913+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567920+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.567926+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.567927+02:00 HN0VADM001 kernel: RIP: 0033:0x7f764c510be7

2025-08-19T10:09:59.567927+02:00 HN0VADM001 kernel: RSP: 002b:00007fff6fe3f1b8 EFLAGS: 00000206 ORIG_RAX: 000000000000004d

2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 000056076d935030 RCX: 00007f764c510be7

2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RDX: 000056076d934dd0 RSI: 0000000002800000 RDI: 0000000000000025

2025-08-19T10:09:59.567928+02:00 HN0VADM001 kernel: RBP: 000056076d92e610 R08: 000056076d93336c R09: 000056076d9350bc

2025-08-19T10:09:59.567929+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000206 R12: 00007fff6fe3f200

2025-08-19T10:09:59.567931+02:00 HN0VADM001 kernel: R13: 00007fff6fe3f1f8 R14: 000056076d92e610 R15: 0000000000000003

2025-08-19T10:09:59.567931+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: INFO: task kworker/u4:4:2743798 blocked for more than 120 seconds.

2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.567932+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.567933+02:00 HN0VADM001 kernel: task:kworker/u4:4    state:D stack:0     pid:2743798 ppid:2      flags:0x00004000

2025-08-19T10:09:59.567935+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0)

2025-08-19T10:09:59.567935+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.567936+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.567942+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.567943+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.567943+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.567944+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.567945+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel:  ? ext4_get_group_desc+0x5a/0xf0 [ext4]

2025-08-19T10:09:59.567947+02:00 HN0VADM001 kernel:  ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4]

2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel:  ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4]

2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel:  ext4_mb_new_blocks+0x4d4/0x11f0 [ext4]

2025-08-19T10:09:59.567948+02:00 HN0VADM001 kernel:  ? ext4_find_extent+0x1a2/0x430 [ext4]

2025-08-19T10:09:59.567953+02:00 HN0VADM001 kernel:  ext4_ext_map_blocks+0x66a/0x19b0 [ext4]

2025-08-19T10:09:59.567954+02:00 HN0VADM001 kernel:  ? release_pages+0x159/0x470

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ? find_get_pages_range_tag+0x1a9/0x200

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ? __pagevec_release+0x1b/0x60

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ext4_map_blocks+0x1b6/0x5f0 [ext4]

2025-08-19T10:09:59.567955+02:00 HN0VADM001 kernel:  ext4_writepages+0x8a0/0x11e0 [ext4]

2025-08-19T10:09:59.567957+02:00 HN0VADM001 kernel:  ? wb_update_bandwidth+0x4e/0x70

2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel:  do_writepages+0xbd/0x1c0

2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel:  __writeback_single_inode+0x3d/0x360

2025-08-19T10:09:59.567959+02:00 HN0VADM001 kernel:  ? wbc_detach_inode+0xfd/0x220

2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel:  writeback_sb_inodes+0x1f5/0x4d0

2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel:  __writeback_inodes_wb+0x4c/0xf0

2025-08-19T10:09:59.567960+02:00 HN0VADM001 kernel:  wb_writeback+0x204/0x2f0

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  wb_workfn+0x350/0x4f0

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  ? check_preempt_curr+0x5d/0x70

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  ? ttwu_do_wakeup+0x17/0x170

2025-08-19T10:09:59.567995+02:00 HN0VADM001 kernel:  process_one_work+0x1c7/0x380

2025-08-19T10:09:59.567996+02:00 HN0VADM001 kernel:  worker_thread+0x4d/0x380

2025-08-19T10:09:59.567996+02:00 HN0VADM001 kernel:  ? rescuer_thread+0x3a0/0x3a0

2025-08-19T10:09:59.567998+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.567999+02:00 HN0VADM001 kernel: INFO: task kworker/u4:5:2743799 blocked for more than 120 seconds.

2025-08-19T10:09:59.568000+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.568000+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.568002+02:00 HN0VADM001 kernel: task:kworker/u4:5    state:D stack:0     pid:2743799 ppid:2      flags:0x00004000

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: Workqueue: writeback wb_workfn (flush-8:0)

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.568003+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.568004+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.568006+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.568006+02:00 HN0VADM001 kernel:  bit_wait_io+0xd/0x60

2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel:  __wait_on_bit+0x4b/0x140

2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel:  ? out_of_line_wait_on_bit_lock+0xb0/0xb0

2025-08-19T10:09:59.568007+02:00 HN0VADM001 kernel:  out_of_line_wait_on_bit+0x91/0xb0

2025-08-19T10:09:59.568008+02:00 HN0VADM001 kernel:  ? sugov_init+0x350/0x350

2025-08-19T10:09:59.568009+02:00 HN0VADM001 kernel:  do_get_write_access+0x244/0x3b0 [jbd2]

2025-08-19T10:09:59.568010+02:00 HN0VADM001 kernel:  jbd2_journal_get_write_access+0x5b/0x80 [jbd2]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  __ext4_journal_get_write_access+0x81/0x180 [ext4]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  ? ext4_get_group_desc+0x5a/0xf0 [ext4]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  ext4_mb_mark_diskspace_used+0x10d/0x3b0 [ext4]

2025-08-19T10:09:59.568011+02:00 HN0VADM001 kernel:  ? ext4_mb_use_preallocated.constprop.0+0x24e/0x250 [ext4]

2025-08-19T10:09:59.568012+02:00 HN0VADM001 kernel:  ext4_mb_new_blocks+0x4d4/0x11f0 [ext4]

2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel:  ? ext4_find_extent+0x1a2/0x430 [ext4]

2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel:  ext4_ext_map_blocks+0x66a/0x19b0 [ext4]

2025-08-19T10:09:59.568014+02:00 HN0VADM001 kernel:  ? release_pages+0x159/0x470

2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel:  ? find_get_pages_range_tag+0x1a9/0x200

2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel:  ? __pagevec_release+0x1b/0x60

2025-08-19T10:09:59.568015+02:00 HN0VADM001 kernel:  ext4_map_blocks+0x1b6/0x5f0 [ext4]

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  ext4_writepages+0x8a0/0x11e0 [ext4]

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  ? ext4_inode_csum+0x20b/0x290 [ext4]

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  do_writepages+0xbd/0x1c0

2025-08-19T10:09:59.568018+02:00 HN0VADM001 kernel:  ? __percpu_counter_sum+0x5a/0x70

2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel:  __writeback_single_inode+0x3d/0x360

2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel:  ? fprop_fraction_percpu+0x2b/0x80

2025-08-19T10:09:59.568019+02:00 HN0VADM001 kernel:  writeback_sb_inodes+0x1f5/0x4d0

2025-08-19T10:09:59.568025+02:00 HN0VADM001 kernel:  __writeback_inodes_wb+0x4c/0xf0

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  wb_writeback+0x204/0x2f0

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  wb_workfn+0x350/0x4f0

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  process_one_work+0x1c7/0x380

2025-08-19T10:09:59.568026+02:00 HN0VADM001 kernel:  worker_thread+0x4d/0x380

2025-08-19T10:09:59.568027+02:00 HN0VADM001 kernel:  ? rescuer_thread+0x3a0/0x3a0

2025-08-19T10:09:59.568029+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.568030+02:00 HN0VADM001 kernel: INFO: task rs:main Q:Reg:2748590 blocked for more than 120 seconds.

2025-08-19T10:09:59.568031+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.568032+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.568033+02:00 HN0VADM001 kernel: task:rs:main Q:Reg   state:D stack:0     pid:2748590 ppid:1      flags:0x00000002

2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.568034+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.568035+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.568035+02:00 HN0VADM001 kernel:  io_schedule+0x42/0x70

2025-08-19T10:09:59.568039+02:00 HN0VADM001 kernel:  folio_wait_bit_common+0x13d/0x350

2025-08-19T10:09:59.568040+02:00 HN0VADM001 kernel:  ? filemap_alloc_folio+0x100/0x100

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  __filemap_get_folio+0x310/0x340

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  pagecache_get_page+0x11/0x60

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  ext4_da_write_begin+0x10c/0x2c0 [ext4]

2025-08-19T10:09:59.568041+02:00 HN0VADM001 kernel:  generic_perform_write+0xd0/0x210

2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel:  ext4_buffered_write_iter+0x84/0x140 [ext4]

2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel:  vfs_write+0x232/0x3f0

2025-08-19T10:09:59.568044+02:00 HN0VADM001 kernel:  ksys_write+0x6b/0xf0

2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel:  ? __alloc_pages+0xf0/0x330

2025-08-19T10:09:59.568045+02:00 HN0VADM001 kernel:  ? __mod_memcg_lruvec_state+0x41/0x90

2025-08-19T10:09:59.568046+02:00 HN0VADM001 kernel:  ? __mod_lruvec_page_state+0x93/0x140

2025-08-19T10:09:59.568048+02:00 HN0VADM001 kernel:  ? page_add_new_anon_rmap+0x6c/0x120

2025-08-19T10:09:59.568048+02:00 HN0VADM001 kernel:  ? set_pte+0x5/0x10

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? __handle_mm_fault+0xeef/0xfa0

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? handle_mm_fault+0xdb/0x2d0

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? do_user_addr_fault+0x1b0/0x550

2025-08-19T10:09:59.568049+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568052+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.568053+02:00 HN0VADM001 kernel: RIP: 0033:0x7efcf5aad9ee

2025-08-19T10:09:59.568054+02:00 HN0VADM001 kernel: RSP: 002b:00007efcf5129778 EFLAGS: 00000246 ORIG_RAX: 0000000000000001

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 00007efcf512a6c0 RCX: 00007efcf5aad9ee

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RDX: 0000000000000c48 RSI: 00007efcec0013b0 RDI: 0000000000000007

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: RBP: 00007efcec0013b0 R08: 0000000000000000 R09: 0000000000000000

2025-08-19T10:09:59.568057+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000246 R12: 00007efcec0010c0

2025-08-19T10:09:59.568058+02:00 HN0VADM001 kernel: R13: 0000000000000000 R14: 00005613ea5702f0 R15: 0000561424a94b20

2025-08-19T10:09:59.568058+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:09:59.568060+02:00 HN0VADM001 kernel: INFO: task update-mime-dat:2753217 blocked for more than 120 seconds.

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel:       Tainted: G             L     6.1.0-38-amd64 #1 Debian 6.1.147-1

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: task:update-mime-dat state:D stack:0     pid:2753217 ppid:2753215 flags:0x00004002

2025-08-19T10:09:59.568061+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:09:59.568062+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:09:59.568064+02:00 HN0VADM001 kernel:  __schedule+0x34d/0x9e0

2025-08-19T10:09:59.568064+02:00 HN0VADM001 kernel:  schedule+0x5a/0xd0

2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel:  jbd2_log_wait_commit+0xd3/0x140 [jbd2]

2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:09:59.568065+02:00 HN0VADM001 kernel:  ext4_sync_file+0x160/0x370 [ext4]

2025-08-19T10:09:59.568066+02:00 HN0VADM001 kernel:  __x64_sys_fdatasync+0x48/0x90

2025-08-19T10:09:59.568066+02:00 HN0VADM001 kernel:  do_syscall_64+0x55/0xb0

2025-08-19T10:09:59.568068+02:00 HN0VADM001 kernel:  ? audit_reset_context+0x232/0x300

2025-08-19T10:09:59.568068+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? fsnotify+0x318/0x840

2025-08-19T10:09:59.568069+02:00 HN0VADM001 kernel:  ? fsnotify+0x522/0x840

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? __fsnotify_parent+0x10f/0x3a0

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? __fsnotify_parent+0x11f/0x3a0

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? __rseq_handle_notify_resume+0xa9/0x4a0

2025-08-19T10:09:59.568072+02:00 HN0VADM001 kernel:  ? mntput_no_expire+0x4a/0x250

2025-08-19T10:09:59.568073+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.568073+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568074+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x40/0x1e0

2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568076+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel:  ? exit_to_user_mode_prepare+0x14b/0x1e0

2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel:  ? syscall_exit_to_user_mode+0x1e/0x40

2025-08-19T10:09:59.568077+02:00 HN0VADM001 kernel:  ? do_syscall_64+0x61/0xb0

2025-08-19T10:09:59.568083+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568084+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568085+02:00 HN0VADM001 kernel:  ? clear_bhb_loop+0x30/0x80

2025-08-19T10:09:59.568085+02:00 HN0VADM001 kernel:  entry_SYSCALL_64_after_hwframe+0x6e/0xd8

2025-08-19T10:09:59.568087+02:00 HN0VADM001 kernel: RIP: 0033:0x7fe7de499687

2025-08-19T10:09:59.568087+02:00 HN0VADM001 kernel: RSP: 002b:00007ffdfc97b2a0 EFLAGS: 00000202 ORIG_RAX: 000000000000004b

2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RAX: ffffffffffffffda RBX: 00007fe7de86fbc0 RCX: 00007fe7de499687

2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003

2025-08-19T10:09:59.568088+02:00 HN0VADM001 kernel: RBP: 000056153ff2ebf0 R08: 0000000000000000 R09: 0000000000000000

2025-08-19T10:09:59.568089+02:00 HN0VADM001 kernel: R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000000

2025-08-19T10:09:59.568089+02:00 HN0VADM001 kernel: R13: 00007ffdfc97b330 R14: 0000000000000003 R15: 00007ffdfc97b428

2025-08-19T10:09:59.568091+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:10:03.169592+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 164s! [kauditd:28]

2025-08-19T10:10:03.169602+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:10:03.169603+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:10:03.169603+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:10:03.169641+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0xbb/0x2b0

2025-08-19T10:10:03.169641+02:00 HN0VADM001 kernel: Code: 24 00 0f 84 9d 01 00 00 65 48 8b 04 25 80 fb 01 00 c7 40 18 01 00 00 00 4c 8d ab 40 03 00 00 48 89 e6 4c 89 ef e8 85 dc 8b ff <8b> 83 f0 00 00 00 85 c0 0f 84 ac 00 00 00 8b 93 18 01 00 00 03 85

2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246

2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RAX: 0000000000000001 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:10:03.169642+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:10:03.169645+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:10:03.169646+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:10:03.169647+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:10:03.169650+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:10:03.169651+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:10:03.169654+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:10:03.169655+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:10:03.169656+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:10:03.169658+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:10:31.169575+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 190s! [kauditd:28]

2025-08-19T10:10:31.169583+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:10:31.169584+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:10:31.169584+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:10:31.169608+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0xee/0x3d0

2025-08-19T10:10:31.169608+02:00 HN0VADM001 kernel: Code: 01 0f 85 29 01 00 00 ba 01 00 00 00 4c 89 e6 48 89 df e8 55 73 fb ff 85 c0 0f 85 30 02 00 00 48 89 e9 48 8d 54 24 08 4c 89 e6 <48> 89 df e8 5a fc ff ff 83 f8 01 0f 85 43 02 00 00 0f b7 85 04 02

2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000246

2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:10:31.169609+02:00 HN0VADM001 kernel: RDX: ffffbb178010be18 RSI: ffff9838c2702200 RDI: ffff9839c0378000

2025-08-19T10:10:31.169612+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:10:31.169612+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:10:31.169613+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:10:31.169614+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:10:31.169614+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:10:31.169629+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:10:31.169630+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:10:31.169631+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:10:31.169632+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:10:31.169634+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:10:31.169635+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:10:31.169636+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:10:38.949656+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:10:38.949686+02:00 HN0VADM001 kernel: rcu:        1-....: (52508 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=26248

2025-08-19T10:10:38.949687+02:00 HN0VADM001 kernel:     (t=52509 jiffies g=11118153 q=11629 ncpus=2)

2025-08-19T10:10:38.949687+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:10:38.949688+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:10:38.949691+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:10:38.949692+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:10:38.949692+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:10:38.949693+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:10:38.949696+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:10:38.949697+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:10:38.949700+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:10:38.949701+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:10:38.949707+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:10:38.949708+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:10:38.949709+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:11:03.169577+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 220s! [kauditd:28]

2025-08-19T10:11:03.169609+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:11:03.169611+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:11:03.169611+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:11:03.169612+02:00 HN0VADM001 kernel: RIP: 0010:__netlink_lookup+0x6c/0x150

2025-08-19T10:11:03.169612+02:00 HN0VADM001 kernel: Code: 8b 4c 24 04 8b 54 24 08 2d 05 41 52 21 01 c1 01 c2 03 04 24 89 ce 31 ca c1 c6 0e 29 f2 89 d6 31 d0 c1 c6 0b 29 f0 89 c6 31 c1 <c1> ce 07 29 f1 89 ce 31 ca c1 c6 10 29 f2 89 d6 31 d0 c1 c6 04 29

2025-08-19T10:11:03.169615+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bde0 EFLAGS: 00000286

2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RAX: 00000000674d4698 RBX: ffff9839c01d4750 RCX: 00000000cb4c0590

2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RDX: 000000002e01cfc1 RSI: 00000000674d4698 RDI: ffff9839c01d4750

2025-08-19T10:11:03.169616+02:00 HN0VADM001 kernel: RBP: ffff9839c2c7bcc0 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:11:03.169617+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:11:03.169617+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffffffffafc95cc0

2025-08-19T10:11:03.169619+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:11:03.169620+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:11:03.169621+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:11:03.169621+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:11:03.169624+02:00 HN0VADM001 kernel:  netlink_unicast+0x130/0x3d0

2025-08-19T10:11:03.169624+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:11:03.169625+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:11:03.169628+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:11:03.169629+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:11:03.169629+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:11:31.169579+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 246s! [kauditd:28]

2025-08-19T10:11:31.169587+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:11:31.169612+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:11:31.169612+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:11:31.169613+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_unlock_irqrestore+0x19/0x40

2025-08-19T10:11:31.169613+02:00 HN0VADM001 kernel: Code: cc cc cc e9 d9 6a 3b 00 0f 1f 44 00 00 eb ed 66 90 0f 1f 44 00 00 c6 07 00 0f 1f 00 f7 c6 00 02 00 00 74 06 fb 0f 1f 44 00 00 <65> ff 0d d0 48 9d 52 74 05 c3 cc cc cc cc 0f 1f 44 00 00 c3 cc cc

2025-08-19T10:11:31.169617+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb0 EFLAGS: 00000206

2025-08-19T10:11:31.169617+02:00 HN0VADM001 kernel: RAX: dead000000000122 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a340

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:11:31.169618+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:11:31.169619+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:11:31.169621+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:11:31.169622+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:11:31.169622+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:11:31.169623+02:00 HN0VADM001 kernel:  netlink_attachskb+0x104/0x2b0

2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:11:31.169626+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:11:31.169627+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:11:31.169630+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:11:31.169631+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:11:41.962221+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:11:41.962293+02:00 HN0VADM001 kernel: rcu:        1-....: (68261 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=34124

2025-08-19T10:11:41.962294+02:00 HN0VADM001 kernel:     (t=68262 jiffies g=11118153 q=13913 ncpus=2)

2025-08-19T10:11:41.962295+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:11:41.962295+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:11:41.962296+02:00 HN0VADM001 kernel: RIP: 0010:_raw_spin_lock_irqsave+0x8/0x50

2025-08-19T10:11:41.962296+02:00 HN0VADM001 kernel: Code: 3d 3d e8 9c 52 e8 68 a3 6b ff 4c 29 e8 49 39 c6 73 d8 80 4d 00 04 eb 8e cc cc cc cc cc cc cc cc cc cc 0f 1f 44 00 00 53 9c 58 <0f> 1f 40 00 48 89 c3 fa 0f 1f 44 00 00 65 ff 05 64 49 9d 52 31 c0

2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bd88 EFLAGS: 00000246

2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RAX: 0000000000000246 RBX: ffffbb178010bdb8 RCX: ffff983aefc2a348

2025-08-19T10:11:41.962300+02:00 HN0VADM001 kernel: RDX: 0000000000034000 RSI: ffffbb178010bdb8 RDI: ffff983aefc2a340

2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a340 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:11:41.962301+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:11:41.962304+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:11:41.962304+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:11:41.962305+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:11:41.962306+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:11:41.962308+02:00 HN0VADM001 kernel:  remove_wait_queue+0x14/0x60

2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel:  netlink_attachskb+0x104/0x2b0

2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:11:41.962309+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:11:41.962310+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:11:41.962313+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:11:41.962313+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:11:41.962314+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:11:41.962315+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:11:41.962317+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:12:07.169578+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 280s! [kauditd:28]

2025-08-19T10:12:07.169587+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:12:07.169588+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:12:07.169588+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:12:07.169609+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0x8b/0x3d0

2025-08-19T10:12:07.169609+02:00 HN0VADM001 kernel: Code: 07 48 8b 85 90 01 00 00 48 89 44 24 08 41 be 01 00 00 00 e9 86 00 00 00 4c 8d b8 80 00 00 00 44 89 f0 f0 0f c1 83 80 00 00 00 <85> c0 0f 84 3d 01 00 00 8d 50 01 09 c2 0f 88 1b 01 00 00 e8 0d 08

2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000206

2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RAX: 0000000000000002 RBX: ffff983aefc2a000 RCX: 0000000000000428

2025-08-19T10:12:07.169610+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a428 RSI: ffffffffafc95cc0 RDI: ffff9839c0378000

2025-08-19T10:12:07.169611+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51

2025-08-19T10:12:07.169614+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:12:07.169614+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:12:07.169615+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:12:07.169616+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:12:07.169618+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:12:07.169619+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:12:07.169620+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:12:07.169620+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:12:07.169623+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:12:07.169624+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:12:35.169582+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 306s! [kauditd:28]

2025-08-19T10:12:35.169625+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:12:35.169627+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:12:35.169627+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:12:35.169628+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x118/0x2b0

2025-08-19T10:12:35.169628+02:00 HN0VADM001 kernel: Code: 80 fb 01 00 c7 40 18 00 00 00 00 4c 89 ef 48 89 e6 e8 7c da 8b ff 48 8d bb 80 00 00 00 b8 ff ff ff ff f0 0f c1 83 80 00 00 00 <83> f8 01 0f 84 ba 00 00 00 85 c0 0f 8e fe 00 00 00 65 48 8b 04 25

2025-08-19T10:12:35.169631+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000213

2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RAX: 0000000000000003 RBX: ffff983aefc2a000 RCX: ffff983aefc2a348

2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a348 RSI: 0000000000000246 RDI: ffff983aefc2a080

2025-08-19T10:12:35.169632+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a348 R09: ffff9839c2c7bd51

2025-08-19T10:12:35.169633+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:12:35.169633+02:00 HN0VADM001 kernel: R13: ffff983aefc2a340 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:12:35.169639+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:12:35.169640+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:12:35.169641+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:12:35.169644+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:12:35.169645+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:12:35.169646+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:12:35.169646+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:12:35.169649+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:12:35.169650+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:12:35.169650+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:12:44.974221+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:12:44.974256+02:00 HN0VADM001 kernel: rcu:        1-....: (84014 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=41999

2025-08-19T10:12:44.974257+02:00 HN0VADM001 kernel:     (t=84015 jiffies g=11118153 q=15612 ncpus=2)

2025-08-19T10:12:44.974257+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: RIP: 0010:sk_filter_trim_cap+0x36/0x250

2025-08-19T10:12:44.974258+02:00 HN0VADM001 kernel: Code: 89 d5 41 54 55 48 89 fd 53 48 89 f3 48 83 ec 30 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 f6 46 7e 40 0f 85 54 01 00 00 <eb> 3c 48 89 de 48 89 ef e8 3d 5b c4 ff 41 89 c4 85 c0 74 56 48 8b

2025-08-19T10:12:44.974261+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bda8 EFLAGS: 00000246

2025-08-19T10:12:44.974262+02:00 HN0VADM001 kernel: RAX: 0000000000000000 RBX: ffff9838c2702200 RCX: 0000000000000428

2025-08-19T10:12:44.974262+02:00 HN0VADM001 kernel: RDX: 0000000000000001 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: RBP: ffff983aefc2a000 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51

2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:12:44.974263+02:00 HN0VADM001 kernel: R13: 0000000000000001 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:12:44.974266+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:12:44.974267+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:12:44.974270+02:00 HN0VADM001 kernel:  ? netlink_attachskb+0x104/0x2b0

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  netlink_unicast+0xdb/0x3d0

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:12:44.974271+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:12:44.974272+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:12:44.974272+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:12:44.974286+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:12:44.974287+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:12:44.974288+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:12:44.974289+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:13:11.169603+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 339s! [kauditd:28]

2025-08-19T10:13:11.169613+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:13:11.169614+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:13:11.169614+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:13:11.169615+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x44/0x2b0

2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: Code: 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 48 c7 04 24 00 00 00 00 65 48 8b 04 25 80 fb 01 00 48 89 44 24 08 8b 86 d8 00 00 00 <48> c7 44 24 18 00 00 00 00 48 c7 44 24 20 00 00 00 00 89 c2 48 c7

2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000246

2025-08-19T10:13:11.169618+02:00 HN0VADM001 kernel: RAX: 0000000000000500 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: RDX: ffffbb178010be18 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:13:11.169619+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:13:11.169622+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:13:11.169623+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:13:11.169626+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:13:11.169627+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:13:11.169628+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:13:11.169630+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:13:11.169631+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:13:11.169632+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:13:11.169632+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:13:39.169605+02:00 HN0VADM001 kernel: watchdog: BUG: soft lockup - CPU#1 stuck for 365s! [kauditd:28]

2025-08-19T10:13:39.169615+02:00 HN0VADM001 kernel: Modules linked in: xt_conntrack xt_MASQUERADE bridge stp llc xt_set ip_set nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 xt_addrtype nft_compat nf_tables libcrc32c nfnetlink xfrm_user xfrm_algo vsock_loopback overlay vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vsock binfmt_misc intel_rapl_msr intel_rapl_common intel_uncore_frequency_common skx_edac_common nfit libnvdimm ghash_clmulni_intel sha512_ssse3 sha512_generic sha256_ssse3 sha1_ssse3 aesni_intel crypto_simd cryptd rapl vmwgfx vmw_balloon drm_ttm_helper pcspkr ttm vmw_vmci evdev joydev drm_kms_helper sg ac serio_raw button drm dm_mod fuse loop efi_pstore configfs ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 crc32c_generic sd_mod t10_pi sr_mod cdrom crc64_rocksoft crc64 crc_t10dif ata_generic crct10dif_generic crct10dif_pclmul crct10dif_common ata_piix crc32_pclmul psmouse crc32c_intel libata vmw_pvscsi vmxnet3 scsi_mod i2c_piix4 scsi_common

2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:13:39.169616+02:00 HN0VADM001 kernel: RIP: 0010:netlink_unicast+0x8b/0x3d0

2025-08-19T10:13:39.169619+02:00 HN0VADM001 kernel: Code: 07 48 8b 85 90 01 00 00 48 89 44 24 08 41 be 01 00 00 00 e9 86 00 00 00 4c 8d b8 80 00 00 00 44 89 f0 f0 0f c1 83 80 00 00 00 <85> c0 0f 84 3d 01 00 00 8d 50 01 09 c2 0f 88 1b 01 00 00 e8 0d 08

2025-08-19T10:13:39.169620+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010be10 EFLAGS: 00000206

2025-08-19T10:13:39.169620+02:00 HN0VADM001 kernel: RAX: 0000000000000002 RBX: ffff983aefc2a000 RCX: 0000000000000428

2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: RDX: ffff983aefc2a428 RSI: ffffffffafc95cc0 RDI: ffff9839c0378000

2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: RBP: ffff9839c0377800 R08: fffffffffffffbd8 R09: ffff9839c2c7bd51

2025-08-19T10:13:39.169621+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffff9838c2702200

2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:13:39.169624+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:13:39.169625+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:13:39.169628+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:13:39.169628+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:13:39.169629+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:13:39.169636+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:13:39.169636+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:13:39.169639+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:13:39.169640+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:13:47.986167+02:00 HN0VADM001 kernel: rcu: INFO: rcu_preempt self-detected stall on CPU

2025-08-19T10:13:47.986176+02:00 HN0VADM001 kernel: rcu:        1-....: (99767 ticks this GP) idle=00cc/1/0x4000000000000000 softirq=28229318/28229318 fqs=49873

2025-08-19T10:13:47.986201+02:00 HN0VADM001 kernel:     (t=99768 jiffies g=11118153 q=16506 ncpus=2)

2025-08-19T10:13:47.986201+02:00 HN0VADM001 kernel: CPU: 1 PID: 28 Comm: kauditd Tainted: G             L     6.1.0-38-amd64 #1  Debian 6.1.147-1

2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020

2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: RIP: 0010:netlink_attachskb+0x79/0x2b0

2025-08-19T10:13:47.986202+02:00 HN0VADM001 kernel: Code: 44 24 20 00 00 00 00 89 c2 48 c7 44 24 10 c0 0d ce ac f0 0f c1 97 f0 00 00 00 01 d0 8b 96 d8 00 00 00 39 c2 0f 84 19 01 00 00 <8b> b7 18 01 00 00 39 f0 0f 82 0b 01 00 00 f0 29 93 f0 00 00 00 49

2025-08-19T10:13:47.986203+02:00 HN0VADM001 kernel: RSP: 0018:ffffbb178010bdb8 EFLAGS: 00000287

2025-08-19T10:13:47.986206+02:00 HN0VADM001 kernel: RAX: 0000000000034000 RBX: ffff983aefc2a000 RCX: ffff9839c0377800

2025-08-19T10:13:47.986206+02:00 HN0VADM001 kernel: RDX: 0000000000000500 RSI: ffff9838c2702200 RDI: ffff983aefc2a000

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: RBP: ffff9838c2702200 R08: ffff983aefc2a000 R09: ffff9839c2c7bd51

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: R10: 0000000000000003 R11: 0000000000000001 R12: ffffbb178010be18

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: R13: 0000000026c176c0 R14: 0000000000000001 R15: ffff983aefc2a080

2025-08-19T10:13:47.986207+02:00 HN0VADM001 kernel: FS:  0000000000000000(0000) GS:ffff983af7d00000(0000) knlGS:0000000000000000

2025-08-19T10:13:47.986210+02:00 HN0VADM001 kernel: CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033

2025-08-19T10:13:47.986210+02:00 HN0VADM001 kernel: CR2: 00007fd3042686d8 CR3: 000000013bcf4003 CR4: 0000000000770ee0

2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: PKRU: 55555554

2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel: Call Trace:

2025-08-19T10:13:47.986211+02:00 HN0VADM001 kernel:  <TASK>

2025-08-19T10:13:47.986212+02:00 HN0VADM001 kernel:  ? wake_up_q+0x90/0x90

2025-08-19T10:13:47.986212+02:00 HN0VADM001 kernel:  netlink_unicast+0xf6/0x3d0

2025-08-19T10:13:47.986214+02:00 HN0VADM001 kernel:  ? audit_net_exit+0x30/0x30

2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel:  kauditd_send_queue+0xab/0x180

2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel:  ? audit_log_lost+0x90/0x90

2025-08-19T10:13:47.986215+02:00 HN0VADM001 kernel:  kauditd_thread+0x12e/0x2d0

2025-08-19T10:13:47.986216+02:00 HN0VADM001 kernel:  ? cpuusage_read+0x10/0x10

2025-08-19T10:13:47.986216+02:00 HN0VADM001 kernel:  ? auditd_reset+0x90/0x90

2025-08-19T10:13:47.986219+02:00 HN0VADM001 kernel:  kthread+0xda/0x100

2025-08-19T10:13:47.986219+02:00 HN0VADM001 kernel:  ? kthread_complete_and_exit+0x20/0x20

2025-08-19T10:13:47.986220+02:00 HN0VADM001 kernel:  ret_from_fork+0x1f/0x30

2025-08-19T10:13:47.986220+02:00 HN0VADM001 kernel:  </TASK>

2025-08-19T10:14:15.229595+02:00 HN0VADM001 kernel: kauditd_printk_skb: 1244 callbacks suppressed


Thomas Kloppholz
IT


experimenta gGmbH
Experimenta-Platz
74072 Heilbronn
Tel. +49 7131 88795 384
E-Mail:
thomas.kloppholz@experimenta.science
Web: https://www.experimenta.science

Informationspflicht zum Schutz Ihrer Daten:
Die Datenschutzhinweise beinhalten Angaben zur Verarbeitung personenbezogener Daten sowie Informationen zu Rechten und Pflichten unserer Besucher/-innen und Geschäftspartner.
Mehr Informationen:
https://www.experimenta.science/datenschutz
Sitz Heilbronn, Amtsgericht Stuttgart HRB 722941, Ust-IdNr. DE 26 47 48 920
Vorsitzende des Aufsichtsrates: Prof. Dr. Bärbel G. Renner
Geschäftsführung: Dr. Franziska Lang und Nico Wiest

Diese E-Mail ist nur für den benannten Empfänger bestimmt und kann Informationen enthalten, die vertraulich sind. Durch die Übersendung wird nicht auf die Rechte am Inhalt oder auf die Vertraulichkeit verzichtet. Bitte informieren Sie uns unverzüglich, wenn Sie diese E-Mail irrtümlich erhalten haben und löschen Sie die Nachricht. Vielen Dank. This e-mail is intended for the named recipient(s) only and may contain information that is privileged and confidential. Nothing in this e-mail is intended to constitute a waiver of any privilege or the confidentiality of this message. If you have received this e-mail in error, please notify us immediately by reply and delete this message. Thank you.



--- End Message ---
--- Begin Message ---
Source: linux
Source-Version: 6.12.43-1
Done: Salvatore Bonaccorso <carnil@debian.org>

We believe that the bug you reported is fixed in the latest version of
linux, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1111017@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <carnil@debian.org> (supplier of updated linux package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 27 Aug 2025 10:10:25 +0200
Source: linux
Architecture: source
Version: 6.12.43-1
Distribution: trixie
Urgency: medium
Maintainer: Debian Kernel Team <debian-kernel@lists.debian.org>
Changed-By: Salvatore Bonaccorso <carnil@debian.org>
Closes: 1108271 1111017
Changes:
 linux (6.12.43-1) trixie; urgency=medium
 .
   * New upstream stable update:
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.42
     - [amd64] ASoC: amd: yc: Add DMI quirk for HP Laptop 17 cp-2033dx
     - ethernet: intel: fix building with large NR_CPUS
     - [amd64] ASoC: amd: yc: Add DMI entries to support HP 15-fb1xxx
     - ALSA: hda/cs35l56: Workaround bad dev-index on Lenovo Yoga Book 9i GenX
     - [amd64] ASoC: Intel: fix SND_SOC_SOF dependencies
     - [amd64] ASoC: amd: yc: add DMI quirk for ASUS M6501RM
     - audit,module: restore audit logging in load failure case
     - parse_longname(): strrchr() expects NUL-terminated string
     - fs_context: fix parameter name in infofc() macro
     - fs/ntfs3: cancle set bad inode after removing name fails
     - ublk: use vmalloc for ublk_device's __queues
     - hfsplus: make splice write available again
     - hfs: make splice write available again
     - hfsplus: remove mutex_lock check in hfsplus_free_extents
     - Revert "fs/ntfs3: Replace inode_trylock with inode_lock"
     - gfs2: No more self recovery
     - io_uring: fix breakage in EXPERT menu
     - ASoC: soc-dai: tidyup return value of snd_soc_xlate_tdm_slot_mask()
     - ASoC: ops: dynamically allocate struct snd_ctl_elem_value
     - ASoC: mediatek: use reserved memory or enable buffer pre-allocation
     - [arm64] dts: freescale: imx93-tqma9352: Limit BUCK2 to 600mV
     - [arm64] soc: qcom: QMI encoding/decoding for big endian
     - [arm64] dts: qcom: sdm845: Expand IMEM region
     - [arm64] dts: qcom: sc7180: Expand IMEM region
     - [arm64] dts: exynos: gs101: Add 'local-timer-stop' to cpuidle nodes
     - [arm64] dts: qcom: sa8775p: Correct the interrupt for remoteproc
     - [arm64] dts: qcom: msm8976: Make blsp_dma controlled-remotely
     - usb: host: xhci-plat: fix incorrect type for of_match variable in
       xhci_plat_probe()
     - usb: misc: apple-mfi-fastcharge: Make power supply names unique
     - [arm64] dts: ti: k3-am642-phyboard-electra: Fix PRU-ICSSG Ethernet ports
     - [arm64] dts: ti: k3-am62p-j722s: fix pinctrl-single size
     - [arm64] firmware: arm_scmi: Fix up turbo frequencies selection
     - usb: typec: ucsi: yoga-c630: fix error and remove paths
     - mei: vsc: Destroy mutex after freeing the IRQ
     - mei: vsc: Event notifier fixes
     - mei: vsc: Unset the event callback on remove and probe errors
     - [armhf] spi: stm32: Check for cfg availability in stm32_spi_probe
     - vmci: Prevent the dispatching of uninitialized payloads
     - pps: fix poll support
     - Revert "vmci: Prevent the dispatching of uninitialized payloads"
     - powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()
     - usb: early: xhci-dbc: Fix early_ioremap leak
     - [armhf] dts: ti: omap: Fixup pinheader typo
     - [arm64] dts: st: fix timer used for ticks
     - [arm64] dts: imx8mm-beacon: Fix HS400 USDHC clock speed
     - [arm64] dts: imx8mn-beacon: Fix HS400 USDHC clock speed
     - PM / devfreq: Check governor before using governor->name
     - PM / devfreq: Fix a index typo in trans_stat
     - cpufreq: intel_pstate: Always use HWP_DESIRED_PERF in passive mode
     - cpufreq: Initialize cpufreq-based frequency-invariance later
     - cpufreq: Init policy->rwsem before it may be possibly used
     - staging: greybus: gbphy: fix up const issue with the match callback
     - [arm64] soc: qcom: pmic_glink: fix OF node leak
     - [arm64] interconnect: qcom: sc8280xp: specify num_links for qnm_a1noc_cfg
     - [arm64] interconnect: qcom: sc8180x: specify num_nodes
     - bus: mhi: host: pci_generic: Fix the modem name of Foxconn T99W640
     - [arm64,armhf] drm/rockchip: cleanup fb when drm_gem_fb_afbc_init failed
     - [arm64,armhf] drm/panfrost: Fix panfrost device variable name in devfreq
     - drm/panthor: Add missing explicit padding in drm_panthor_gpu_info
     - bpf, sockmap: Fix psock incorrectly pointing to sk
     - bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls
     - net: ipv6: ip6mr: Fix in/out netdev to pass to the FORWARD chain
     - drm/vmwgfx: Fix Host-Backed userspace on Guest-Backed kernel
     - drm/amdgpu: Remove nbiov7.9 replay count reporting
     - bpftool: Fix memory leak in dump_xx_nlmsg on realloc failure
     - [powerpc*] pseries/dlpar: Search DRC index from ibm,drc-indexes for IO add
     - wifi: rtw89: avoid NULL dereference when RX problematic packet on
       unsupported 6 GHz band
     - wifi: rtl818x: Kill URBs before clearing tx status queue
     - wifi: iwlwifi: Fix memory leak in iwl_mvm_init()
     - iwlwifi: Add missing check for alloc_ordered_workqueue
     - wifi: ath11k: clear initialized flag for deinit-ed srng lists
     - tcp: fix tcp_ofo_queue() to avoid including too much DUP SACK range
     - net/mlx5: Check device memory pointer before usage
     - net: dst: annotate data-races around dst->input
     - net: dst: annotate data-races around dst->output
     - bpf: Ensure RCU lock is held around bpf_prog_ksym_find
     - [arm64] drm/msm/dpu: Fill in min_prefill_lines for SC8180X
     - refscale: Check that nreaders and loops multiplication doesn't overflow
     - drm/amd/pm/powerplay/hwmgr/smu_helper: fix order of mask and value
     - sched/psi: Optimize psi_group_change() cpu_clock() usage
     - fbcon: Fix outdated registered_fb reference in comment
     - netfilter: nf_tables: Drop dead code from fill_*_info routines
     - netfilter: nf_tables: adjust lockdep assertions handling
     - [amd64] iommu/amd: Enable PASID and ATS capabilities in the correct order
     - net/sched: Restrict conditions for adding duplicating netems to qdisc tree
     - net_sched: act_ctinfo: use atomic64_t for three counters
     - RDMA/mlx5: Fix UMR modifying of mkey page size
     - xen: fix UAF in dmabuf_exp_from_pages()
     - xen/gntdev: remove struct gntdev_copy_batch from stack
     - tcp: call tcp_measure_rcv_mss() for ooo packets
     - wifi: rtl8xxxu: Fix RX skb size for aggregation disabled
     - wifi: rtw88: Fix macid assigned to TDLS station
     - mwl8k: Add missing check after DMA map
     - wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()
     - drm/amdgpu/gfx9: fix kiq locking in KCQ reset
     - drm/amdgpu/gfx9.4.3: fix kiq locking in KCQ reset
     - drm/amdgpu/gfx10: fix kiq locking in KCQ reset
     - [amd64] iommu/amd: Fix geometry.aperture_end for V2 tables
     - rcu: Fix delayed execution of hurry callbacks
     - wifi: mac80211: reject TDLS operations when station is not associated
     - wifi: plfxlc: Fix error handling in usb driver probe
     - wifi: mac80211: Do not schedule stopped TXQs
     - wifi: mac80211: Don't call fq_flow_idx() for management frames
     - wifi: mac80211: Check 802.11 encaps offloading in
       ieee80211_tx_h_select_key()
     - Reapply "wifi: mac80211: Update skb's control block key in
       ieee80211_tx_dequeue()"
     - wifi: ath12k: fix endianness handling while accessing wmi service bit
     - wifi: brcmfmac: fix P2P discovery failure in P2P peer due to missing P2P
       IE
     - wifi: mac80211: Write cnt before copying in ieee80211_copy_rnr_beacon()
     - wifi: nl80211: Set num_sub_specs before looping through sub_specs
     - ring-buffer: Remove ring_buffer_read_prepare_sync()
     - memcg_slabinfo: Fix use of PG_slab
     - Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'
     - Bluetooth: hci_event: Mask data status from LE ext adv reports
     - bpf: Disable migration in nf_hook_run_bpf().
     - can: peak_usb: fix USB FD devices potential malfunction
     - can: kvaser_pciefd: Store device channel index
     - can: kvaser_usb: Assign netdev.dev_port based on device channel index
     - netfilter: xt_nfacct: don't assume acct name is null-terminated
     - net/mlx5e: Clear Read-Only port buffer size in PBMC before update
     - net/mlx5e: Remove skb secpath if xfrm state is not found
     - stmmac: xsk: fix negative overflow of budget in zerocopy mode
     - vrf: Drop existing dst reference in vrf_ip6_input_dst
     - ipv6: prevent infinite loop in rt6_nlmsg_size()
     - ipv6: fix possible infinite loop in fib6_info_uses_dev()
     - ipv6: annotate data-races around rt->fib6_nsiblings
     - bpf/preload: Don't select USERMODE_DRIVER
     - [arm64] bpf, arm64: Fix fp initialization for exception boundary
     - fortify: Fix incorrect reporting of read buffer size
     - [arm64] PCI: rockchip-host: Fix "Unexpected Completion" log message
     - [arm64] clk: renesas: rzv2h: Fix missing CLK_SET_RATE_PARENT flag for ddiv
       clocks
     - [arm64] crypto: sun8i-ce - fix nents passed to dma_unmap_sg()
     - [amd64] crypto: qat - use unmanaged allocation for dc_data
     - [arm64,armhf] crypto: marvell/cesa - Fix engine load inaccuracy
     - [amd64] crypto: qat - allow enabling VFs in the absence of IOMMU
     - [amd64] crypto: qat - fix state restore for banks with exceptions
     - mtd: fix possible integer overflow in erase_xfer()
     - media: v4l2-ctrls: Fix H264 SEPARATE_COLOUR_PLANE check
     - power: supply: cpcap-charger: Fix null check for power_supply_get_by_name
     - power: supply: max14577: Handle NULL pdata when CONFIG_OF is not set
     - [armhf] crypto: arm/aes-neonbs - work around gcc-15 warning
     - pinctrl: sunxi: Fix memory leak on krealloc failure
     - dmaengine: mmp: Fix again Wvoid-pointer-to-enum-cast warning
     - [arm64] phy: qualcomm: phy-qcom-eusb2-repeater: Don't zero-out registers
     - fanotify: sanitize handle_type values when reporting fid
     - Fix dma_unmap_sg() nents value
     - perf tools: Fix use-after-free in help_unknown_cmd()
     - perf dso: Add missed dso__put to dso__load_kcore
     - mtd: spi-nor: spansion: Fixup params->set_4byte_addr_mode for SEMPER
     - perf sched: Make sure it frees the usage string
     - perf sched: Free thread->priv using priv_destructor
     - perf sched: Fix memory leaks in 'perf sched map'
     - perf sched: Fix memory leaks for evsel->priv in timehist
     - perf sched: Use RC_CHK_EQUAL() to compare pointers
     - perf sched: Fix memory leaks in 'perf sched latency'
     - [arm64] RDMA/hns: Fix double destruction of rsv_qp
     - [arm64] RDMA/hns: Fix HW configurations not cleared in error flow
     - [amd64] crypto: ccp - Fix locking on alloc failure handling
     - [arm64] crypto: inside-secure - Fix `dma_unmap_sg()` nents value
     - [amd64] crypto: ccp - Fix crash when rebind ccp device for ccp.ko
     - [arm64] RDMA/hns: Get message length of ack_req from FW
     - [arm64] RDMA/hns: Fix accessing uninitialized resources
     - [arm64] RDMA/hns: Drop GFP_NOWARN
     - [arm64] RDMA/hns: Fix -Wframe-larger-than issue
     - kernel: trace: preemptirq_delay_test: use offstack cpu mask
     - proc: use the same treatment to check proc_lseek as ones for
       proc_read_iter et.al
     - pinmux: fix race causing mux_owner NULL with active mux_usecount
     - perf tests bp_account: Fix leaked file descriptor
     - [riscv64] clk: thead: th1520-ap: Correctly refer the parent of osc_12m
     - [armhf] clk: sunxi-ng: v3s: Fix de clock definition
     - [ppc64el] scsi: ibmvscsi_tgt: Fix dma_unmap_sg() nents value
     - scsi: mvsas: Fix dma_unmap_sg() nents value
     - scsi: isci: Fix dma_unmap_sg() nents value
     - ext4: Make sure BH_New bit is cleared in ->write_end handler
     - [arm64] hwrng: mtk - handle devm_pm_runtime_enable errors
     - [amd64] crypto: qat - disable ZUC-256 capability for QAT GEN5
     - soundwire: stream: restore params when prepare ports fail
     - PCI: endpoint: pci-epf-vntb: Fix the incorrect usage of __iomem attribute
     - remoteproc: xlnx: Disable unsupported features
     - fs/orangefs: Allow 2 more characters in do_c_string()
     - dmaengine: mv_xor: Fix missing check after DMA map and missing unmap
     - dmaengine: nbpfaxi: Add missing check after DMA map
     - perf tools: Remove libtraceevent in .gitignore
     - [amd64] crypto: qat - fix DMA direction for compression on GEN2 devices
     - [amd64] crypto: qat - fix seq_file position update in adf_ring_next()
     - fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref
     - jfs: fix metapage reference count leak in dbAllocCtl
     - drm/xe/vf: Disable CSC support on VF
     - perf record: Cache build-ID of hit DSOs only
     - vdpa/mlx5: Fix needs_teardown flag calculation
     - vhost-scsi: Fix log flooding with target does not exist errors
     - vdpa/mlx5: Fix release of uninitialized resources on error path
     - vdpa: Fix IDR memory leak in VDUSE module exit
     - vhost: Reintroduce kthread API and add mode selection
     - bpf: Check flow_dissector ctx accesses are aligned
     - bpf: Check netfilter ctx accesses are aligned
     - apparmor: ensure WB_HISTORY_SIZE value is a power of 2
     - apparmor: fix loop detection used in conflicting attachment resolution
     - apparmor: Fix unaligned memory accesses in KUnit test
     - module: Restore the moduleparam prefix length check
     - ucount: fix atomic_long_inc_below() argument type
     - rtc: ds1307: fix incorrect maximum clock rate handling
     - rtc: hym8563: fix incorrect maximum clock rate handling
     - rtc: nct3018y: fix incorrect maximum clock rate handling
     - rtc: pcf85063: fix incorrect maximum clock rate handling
     - rtc: pcf8563: fix incorrect maximum clock rate handling
     - rtc: rv3028: fix incorrect maximum clock rate handling
     - f2fs: turn off one_time when forcibly set to foreground GC
     - f2fs: fix bio memleak when committing super block
     - f2fs: fix KMSAN uninit-value in extent_info usage
     - f2fs: fix to check upper boundary for value of gc_boost_zoned_gc_percent
     - f2fs: fix to check upper boundary for gc_valid_thresh_ratio
     - f2fs: fix to check upper boundary for gc_no_zoned_gc_percent
     - f2fs: doc: fix wrong quota mount option description
     - f2fs: fix to avoid UAF in f2fs_sync_inode_meta()
     - f2fs: fix to avoid panic in f2fs_evict_inode
     - f2fs: fix to avoid out-of-boundary access in devs.path
     - f2fs: vm_unmap_ram() may be called from an invalid context
     - f2fs: fix to update upper_p in __get_secs_required() correctly
     - f2fs: fix to calculate dirty data during has_not_enough_free_secs()
     - f2fs: fix to trigger foreground gc during f2fs_map_blocks() in lfs mode
     - exfat: fdatasync flag should be same like generic_write_sync()
     - i2c: muxes: mule: Fix an error handling path in mule_i2c_mux_probe()
     - vfio: Fix unbalanced vfio_df_close call in no-iommu mode
     - vfio: Prevent open_count decrement to negative
     - vfio/pds: Fix missing detach_ioas op
     - vfio/pci: Separate SR-IOV VF dev_set
     - scsi: mpt3sas: Fix a fw_event memory leak
     - scsi: Revert "scsi: iscsi: Fix HW conn removal use after free"
     - scsi: ufs: core: Use link recovery when h8 exit fails during runtime
       resume
     - scsi: sd: Make sd shutdown issue START STOP UNIT appropriately
     - kconfig: qconf: fix ConfigList::updateListAllforAll()
     - sched/psi: Fix psi_seq initialization
     - PCI: pnv_php: Clean up allocated IRQs on unplug
     - PCI: pnv_php: Work around switches with broken presence detection
     - [powerpc*] eeh: Export eeh_unfreeze_pe()
     - [powerpc*] eeh: Make EEH driver device hotplug safe
     - PCI: pnv_php: Fix surprise plug detection and recovery
     - pNFS/flexfiles: don't attempt pnfs on fatal DS errors
     - sched: Add test_and_clear_wake_up_bit() and atomic_dec_and_wake_up()
     - NFS: Fix wakeup of __nfs_lookup_revalidate() in unblock_revalidate()
     - NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()
     - NFSv4.2: another fix for listxattr
     - NFS: Fixup allocation flags for nfsiod's __GFP_NORETRY
     - md/md-cluster: handle REMOVE message earlier
     - netpoll: prevent hanging NAPI when netcons gets enabled
     - phy: mscc: Fix parsing of unicast frames
     - net: ipa: add IPA v5.1 and v5.5 to ipa_version_string()
     - pptp: ensure minimal skb length in pptp_xmit()
     - nvmet: initialize discovery subsys after debugfs is initialized
     - [s390x] ap: Unmask SLCF bit in card and queue ap functions sysfs
     - netlink: specs: ethtool: fix module EEPROM input/output arguments
     - block: Fix default IO priority if there is no IO context
     - block: ensure discard_granularity is zero when discard is not supported
     - ASoC: tas2781: Fix the wrong step for TLV on tas2781
     - [amd64] spi: cs42l43: Property entry should be a null-terminated array
     - net/mlx5: Correctly set gso_segs when LRO is used
     - ipv6: reject malicious packets in ipv6_gso_segment()
     - net: mdio: mdio-bcm-unimac: Correct rate fallback logic
     - net: drop UFO packets in udp_rcv_segment()
     - net/sched: taprio: enforce minimum value for picos_per_byte
     - sunrpc: fix client side handling of tls alerts
     - [x86] irq: Plug vector setup race
     - benet: fix BUG when creating VFs
     - net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing
     - [s390x] mm: Allocate page table with PAGE_SIZE granularity
     - eth: fbnic: remove the debugging trick of super high page bias
     - irqchip: Build IMX_MU_MSI only on ARM
     - ALSA: hda/ca0132: Fix missing error handling in ca0132_alt_select_out()
     - smb: server: remove separate empty_recvmsg_queue
     - smb: server: make sure we call ib_dma_unmap_single() only if we called
       ib_dma_map_single already
     - smb: server: let recv_done() consistently call
       put_recvmsg/smb_direct_disconnect_rdma_connection
     - smb: server: let recv_done() avoid touching data_transfer after
       cleanup/move
     - smb: client: remove separate empty_packet_queue
     - smb: client: make sure we call ib_dma_unmap_single() only if we called
       ib_dma_map_single already
     - smb: client: let recv_done() cleanup before notifying the callers.
     - smb: client: let recv_done() avoid touching data_transfer after
       cleanup/move
     - nvmet: exit debugfs after discovery subsystem exits
     - pptp: fix pptp_xmit() error path
     - smb: client: return an error if rdma_connect does not return within 5
       seconds
     - sunrpc: fix handling of server side tls alerts
     - perf/core: Don't leak AUX buffer refcount on allocation failure
     - perf/core: Exit early on perf_mmap() fail
     - perf/core: Prevent VMA split of buffer mappings
     - selftests/perf_events: Add a mmap() correctness test
     - net/packet: fix a race in packet_set_ring() and packet_notifier()
     - vsock: Do not allow binding to VMADDR_PORT_ANY
     - [amd64] accel/ivpu: Fix reset_engine debugfs file logic
     - Revert "bcache: remove heap-related macros and switch to generic min_heap"
     - ice/ptp: fix crosstimestamp reporting
     - [amd64] drm/i915/ddi: change intel_ddi_init_{dp, hdmi}_connector() return
       type
     - [amd64] drm/i915/hdmi: propagate errors from intel_hdmi_init_connector()
     - [amd64] drm/i915/hdmi: add error handling in g4x_hdmi_init()
     - [amd64] drm/i915/ddi: gracefully handle errors from
       intel_ddi_init_hdmi_connector()
     - [amd64] drm/i915/display: add intel_encoder_is_hdmi()
     - [amd64] drm/i915/ddi: only call shutdown hooks for valid encoders
     - ksmbd: fix null pointer dereference error in generate_encryptionkey
     - ksmbd: fix Preauh_HashValue race condition
     - ksmbd: fix corrupted mtime and ctime in smb2_open
     - ksmbd: limit repeated connections from clients with the same IP
       (CVE-2025-38501)
     - smb: server: Fix extension string in ksmbd_extract_shortname()
     - USB: serial: option: add Foxconn T99W709
     - PCI/ASPM: Save parent L1SS config in pci_save_aspm_l1ss_state()
     - PCI/ASPM: Fix L1SS saving
     - Bluetooth: btusb: Add USB ID 3625:010b for TP-LINK Archer TX10UB Nano
     - net: usbnet: Avoid potential RCU stall on LINK_CHANGE event
     - net: usbnet: Fix the wrong netif_carrier_on() call
     - [x86] sev: Evict cache lines during SNP memory validation (CVE-2024-36331)
     - ALSA: intel_hdmi: Fix off-by-one error in __hdmi_lpe_audio_probe()
     - ALSA: scarlett2: Add retry on -EPROTO from scarlett2_usb_tx()
     - ALSA: hda/realtek - Fix mute LED for HP Victus 16-r1xxx
     - ALSA: hda/realtek - Fix mute LED for HP Victus 16-s0xxx
     - ALSA: hda/realtek - Fix mute LED for HP Victus 16-d1xxx (MB 8A26)
     - [adm64] platform/x86/intel/pmt: fix a crashlog NULL pointer access
     - [x86] fpu: Delay instruction pointer fixup until after warning
     - [s390x] mm: Remove possible false-positive warning in pte_free_defer()
     - [mips*] mm: tlb-r4k: Uniquify TLB entries on init
     - mm/hmm: move pmd_to_hmm_pfn_flags() to the respective #ifdeffery
     - mm: swap: correctly use maxpages in swapon syscall to avoid potential
       deadloop
     - mm: swap: fix potential buffer overflow in setup_clusters()
     - perf/arm-ni: Set initial IRQ affinity
     - media: ti: j721e-csi2rx: fix list_del corruption
     - HID: apple: validate feature-report field count to prevent NULL pointer
       dereference
     - USB: gadget: f_hid: Fix memory leak in hidg_bind error path
     - usb: gadget : fix use-after-free in composite_dev_cleanup()
     https://www.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.12.43
     - io_uring: don't use int for ABI
     - ALSA: usb-audio: Validate UAC3 power domain descriptors, too
     - ALSA: usb-audio: Validate UAC3 cluster segment descriptors
     - ALSA: hda/realtek: Fix headset mic on HONOR BRB-X
     - ALSA: hda/realtek: Add Framework Laptop 13 (AMD Ryzen AI 300) to quirks
     - smb3: fix for slab out of bounds on mount to ksmbd
     - smb: client: remove redundant lstrp update in negotiate protocol
     - gpio: virtio: Fix config space reading.
     - gpio: mlxbf2: use platform_get_irq_optional()
     - Revert "gpio: mlxbf3: only get IRQ for device instance 0"
     - gpio: mlxbf3: use platform_get_irq_optional()
     - leds: flash: leds-qcom-flash: Fix registry access after re-bind
     - Revert "leds: trigger: netdev: Configure LED blink interval for HW
       offload"
     - netlink: avoid infinite retry looping in netlink_unicast()
       (Closes: #1111017)
     - net: phy: micrel: fix KSZ8081/KSZ8091 cable test
     - [armhf] net: ftgmac100: fix potential NULL pointer access in
       ftgmac100_phy_disconnect
     - [arm64] net: enetc: fix device and OF node leak at probe
     - [arm64] net: mtk_eth_soc: fix device leak at probe
     - [arm64] net: ti: icss-iep: fix device and OF node leaks at probe
     - net: usb: asix_devices: add phy_mask for ax88772 mdio bus
     - nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()
     - NFSD: detect mismatch of file handle and delegation stateid in OPEN op
     - NFS: Fix the setting of capabilities when automounting a new filesystem
     - PCI: Extend isolated function probing to LoongArch
     - [arm64] clk: samsung: exynos850: fix a comment
     - [arm64] clk: samsung: gs101: fix CLK_DOUT_CMU_G3D_BUSD
     - [arm64] clk: samsung: gs101: fix alternate mout_hsi0_usb20_ref parent
       clock
     - fscrypt: Don't use problematic non-inline crypto engines
     - fs: Prevent file descriptor table allocations exceeding INT_MAX
     - eventpoll: Fix semi-unbounded recursion (CVE-2025-38614)
     - Documentation: ACPI: Fix parent device references
     - ACPI: processor: perflib: Fix initial _PPC limit application
     - ACPI: processor: perflib: Move problematic pr->performance check
     - block: Make REQ_OP_ZONE_FINISH a write operation
     - mm/memory-tier: fix abstract distance calculation overflow
     - smb: client: let send_done() cleanup before calling
       smbd_disconnect_rdma_connection()
     - smb: client: don't wait for info->send_pending == 0 on error
     - [amd64] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic
       bitmap
     - [amd64] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN
       flag
     - [amd64] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is
       supported
     - [amd64] KVM: VMX: Extract checking of guest's DEBUGCTL into helper
     - [amd64] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter
     - [amd64] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter
       APIs
     - [amd64] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running
       the guest
     - [amd64] habanalabs: fix UAF in export_dmabuf()
     - mm/smaps: fix race between smaps_hugetlb_range and migration
     - udp: also consider secpath when evaluating ipsec use for checksumming
     - netfilter: ctnetlink: fix refcount leak on table dump
     - [arm64] net: ti: icssg-prueth: Fix emac link speed handling
     - [arm64] net: ti: icss-iep: Fix incorrect type for return value in
       extts_enable()
     - sctp: linearize cloned gso packets in sctp_rcv
     - [amd64] intel_idle: Allow loading ACPI tables for any family
     - cpuidle: governors: menu: Avoid using invalid recent intervals data
     - ptp: prevent possible ABBA deadlock in ptp_clock_freerun()
     - tls: handle data disappearing from under the TLS ULP (CVE-2025-38616)
     - net: kcm: Fix race condition in kcm_unattach()
     - hfs: fix general protection fault in hfs_find_init()
     - hfs: fix slab-out-of-bounds in hfs_bnode_read()
     - hfsplus: fix slab-out-of-bounds in hfsplus_bnode_read()
     - hfsplus: fix slab-out-of-bounds read in hfsplus_uni2asc()
     - hfsplus: don't use BUG_ON() in hfsplus_create_attributes_file()
     - [arm64] Handle KCOV __init vs inline mismatches
     - smb/server: avoid deadlock when linking with ReplaceIfExists
     - nvme-pci: try function level reset on init failure
     - dm-stripe: limit chunk_sectors to the stripe size
     - md/raid10: set chunk_sectors limit
     - nvme-tcp: log TLS handshake failures at error level
     - gfs2: Validate i_depth for exhash directories
     - gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops
     - loop: Avoid updating block size under exclusive owner
     - udf: Verify partition map count
     - drbd: add missing kref_get in handle_write_conflicts
     - hfs: fix not erasing deleted b-tree node issue
     - better lockdep annotations for simple_recursive_removal()
     - ata: ahci: Disallow LPM policy control if not supported
     - ata: ahci: Disable DIPM if host lacks support
     - ata: libata-sata: Disallow changing LPM state if not supported
     - fs/ntfs3: Add sanity check for file name
     - fs/ntfs3: correctly create symlink for relative path
     - pidfs: raise SB_I_NODEV and SB_I_NOEXEC
     - fix locking in efi_secret_unlink()
     - securityfs: don't pin dentries twice, once is enough...
     - tracefs: Add d_delete to remove negative dentries
     - usb: xhci: print xhci->xhc_state when queue_command failed
     - [amd64] platform/x86/amd: pmc: Add Lenovo Yoga 6 13ALC6 to pmc quirk list
     - cpufreq: CPPC: Mark driver with NEED_UPDATE_LIMITS flag
     - usb: typec: ucsi: psy: Set current max to 100mA for BC 1.2 and Default
     - usb: xhci: Avoid showing warnings for dying controller
     - usb: xhci: Set avg_trb_len = 8 for EP0 during Address Device Command
     - usb: xhci: Avoid showing errors during surprise removal
     - [arm64] soc: qcom: rpmh-rsc: Add RSC version 4 support
     - ACPI: APEI: send SIGBUS to current task if synchronous memory error not
       recovered
     - remoteproc: imx_rproc: skip clock enable when M-core is managed by the SCU
     - usb: typec: tcpm/tcpci_maxim: fix irq wake usage
     - pmdomain: ti: Select PM_GENERIC_DOMAINS
     - [arm64] gpio: wcd934x: check the return value of regmap_update_bits()
     - cpufreq: Exit governor when failed to start old governor
     - cpufreq: intel_pstate: Add Granite Rapids support in no-HWP mode
     - [armhf] rockchip: fix kernel hang during smp initialization
     - PM / devfreq: governor: Replace sscanf() with kstrtoul() in
       set_freq_store()
     - ASoC: soc-dapm: set bias_level if snd_soc_dapm_set_bias_level() was
       successed
     - [arm64] thermal/drivers/qcom-spmi-temp-alarm: Enable stage 2 shutdown when
       required
     - iio: adc: ad_sigma_delta: don't overallocate scan buffer
     - [armhf] tegra: Use I/O memcpy to write to IRAM
     - ACPI: PRM: Reduce unnecessary printing to avoid user confusion
     - PM: runtime: Clear power.needs_force_resume in pm_runtime_reinit()
     - thermal: sysfs: Return ENODATA instead of EAGAIN for reads
     - PM: sleep: console: Fix the black screen issue
     - ACPI: processor: fix acpi_object initialization
     - [arm64] mmc: sdhci-msm: Ensure SD card power isn't ON when card removed
     - ACPI: APEI: GHES: add TAINT_MACHINE_CHECK on GHES panic path
     - pps: clients: gpio: fix interrupt handling order in remove path
     - reset: brcmstb: Enable reset drivers for ARCH_BCM2835
     - char: misc: Fix improper and inaccurate error code returned by misc_init()
     - [amd64] mei: bus: Check for still connected devices in
       mei_cl_bus_dev_release()
     - mmc: rtsx_usb_sdmmc: Fix error-path in sd_set_power_mode()
     - [amd64,arm64] platform/chrome: cros_ec_sensorhub: Retries when a sensor is
       not ready
     - ALSA: hda: Handle the jack polling always via a work
     - ALSA: hda: Disable jack polling at shutdown
     - [amd64] x86/bugs: Avoid warning when overriding return thunk
     - ASoC: hdac_hdmi: Rate limit logging on connection and disconnection
     - ALSA: intel8x0: Fix incorrect codec index usage in mixer for ICH4
     - ASoC: SOF: topology: Parse the dapm_widget_tokens in case of DSPless mode
     - tty: serial: fix print format specifiers
     - ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()
     - usb: typec: intel_pmc_mux: Defer probe if SCU IPC isn't present
     - usb: core: usb_submit_urb: downgrade type check
     - pm: cpupower: Fix the snapshot-order of tsc,mperf, clock in mperf_stop()
     - [arm64] imx8m-blk-ctrl: set ISI panic write hurry level
     - [arm64] soc: qcom: mdt_loader: Actually use the e_phoff
     - [amd64] platform/x86: thinkpad_acpi: Handle KCOV __init vs inline
       mismatches
     - [amd64,arm64] platform/chrome: cros_ec_typec: Defer probe on missing EC
       parent
     - ALSA: hda/ca0132: Fix buffer overflow in add_tuning_control
     - ALSA: pcm: Rewrite recalculate_boundary() to avoid costly loop
     - ALSA: usb-audio: Avoid precedence issues in mixer_quirks macros
     - iio: adc: ad7768-1: Ensure SYNC_IN pulse minimum timing requirement
     - ASoC: codecs: rt5640: Retry DEVICE_ID verification
     - [arm64] ASoC: qcom: use drvdata instead of component to keep id
     - netfilter: nft_set_pipapo: prefer kvmalloc for scratch maps
     - [powerpc*] thp: tracing: Hide hugepage events under CONFIG_PPC_BOOK3S_64
     - Bluetooth: btusb: Add new VID/PID 0489/e14e for MT7925
     - Bluetooth: hci_sock: Reset cookie to zero in hci_sock_free_cookie()
     - xen/netfront: Fix TX response spurious interrupts
     - wifi: iwlwifi: mvm: avoid outdated reorder buffer head_sn
     - net: usb: cdc-ncm: check for filtering capability
     - wifi: ath12k: Correct tid cleanup when tid setup fails
     - wifi: cfg80211: reject HTC bit for management frames
     - [s390x] time: Use monotonic clock in get_cycles()
     - be2net: Use correct byte order and format string for TCP seq and ack_seq
     - libbpf: Verify that arena map exists when adding arena relocations
     - idpf: preserve coalescing settings across resets
     - wifi: rtw89: wow: Add Basic Rate IE to probe request in scheduled scan
       mode
     - wifi: rtw89: Lower the timeout in rtw89_fw_read_c2h_reg() for USB
     - et131x: Add missing check after DMA map
     - net: ag71xx: Add missing check after DMA map
     - net/mlx5e: Properly access RCU protected qdisc_sleeping variable
     - net: pcs: xpcs: mask readl() return value to 16 bits
     - [arm64] Mark kernel as tainted on SAE and SError panic
     - drm/amd/pm: fix null pointer access
     - rcu: Protect ->defer_qs_iw_pending from data race
     - drm/amd/display: limit clear_update_flags to dcn32 and above
     - net: mctp: Prevent duplicate binds
     - wifi: cfg80211: Fix interface type validation
     - wifi: mac80211: don't unreserve never reserved chanctx
     - net: ipv4: fix incorrect MTU in broadcast routes
     - [arm64] net: thunderx: Fix format-truncation warning in
       bgx_acpi_match_id()
     - net: phy: micrel: Add ksz9131_resume()
     - sched/deadline: Fix accounting after global limits change
     - bpf: Forget ranges when refining tnum after JSET
     - wifi: iwlwifi: mvm: set gtk id also in older FWs
     - wifi: iwlwifi: mvm: fix scan request validation
     - [s390x] stp: Remove udelay from stp_sync_clock()
     - net: phy: bcm54811: PHY initialization
     - sched/fair: Bump sd->max_newidle_lb_cost when newidle balance fails
     - wifi: mac80211: don't complete management TX on SAE commit
     - wifi: mac80211: avoid weird state in error path
     - [s390x] early: Copy last breaking event address to pt_regs
     - ipv6: mcast: Check inet6_dev->dead under idev->mc_lock in
       __ipv6_dev_mc_inc().
     - rcu/nocb: Fix possible invalid rdp's->nocb_cb_kthread pointer access
     - wifi: mac80211: fix rx link assignment for non-MLO stations
     - [arm64] drm/msm: use trylock for debugfs
     - [arm64] drm/msm: Add error handling for krealloc in metadata setup
     - [arm64] perf/arm: Add missing .suppress_bind_attrs
     - wifi: rtw89: Fix rtw89_mac_power_switch() for USB
     - wifi: mt76: mt7915: mcu: re-init MCU before loading FW patch
     - drm/xe/xe_query: Use separate iterator while filling GT list
     - [amd64] net: thunderbolt: Enable end-to-end flow control also in transmit
     - [amd64] net: thunderbolt: Fix the parameter passing of
       tb_xdomain_enable_paths()/tb_xdomain_disable_paths()
     - xfrm: Duplicate SPI Handling
     - net: atlantic: add set_power to fw_ops for atl2 to fix wol
     - ACPI: Suppress misleading SPCR console message when SPCR table is absent
     - net: ieee8021q: fix insufficient table-size assertion
     - net: fec: allow disable coalescing
     - drm/amd/display: Separate set_gsl from set_gsl_source_select
     - wifi: ath10k: shutdown driver when hardware is unreliable
     - wifi: ath12k: Add memset and update default rate value in wmi tx
       completion
     - wifi: ath12k: Fix station association with MBSSID Non-TX BSS
     - wifi: iwlwifi: dvm: fix potential overflow in rs_fill_link_cmd()
     - wifi: iwlwifi: fw: Fix possible memory leak in iwl_fw_dbg_collect
     - drm/amd/display: Fix 'failed to blank crtc!'
     - drm/amd/display: Initialize mode_select to 0
     - wifi: mac80211: update radar_required in channel context after channel
       switch
     - wifi: rtlwifi: fix possible skb memory leak in `_rtl_pci_rx_interrupt()`.
     - wifi: ath12k: Enable REO queue lookup table feature on QCN9274 hw2.0
     - wifi: ath12k: Decrement TID on RX peer frag setup error handling
     - [powerpc*] floppy: Add missing checks after DMA map
     - netmem: fix skb_frag_address_safe with unreadable skbs
     - [arm64] stacktrace: Check kretprobe_find_ret_addr() return value
     - wifi: iwlegacy: Check rate_idx range after addition
     - neighbour: add support for NUD_PERMANENT proxy entries
     - dpaa_eth: don't use fixed_phy_change_carrier
     - drm/amd: Allow printing VanGogh OD SCLK levels without setting dpm to
       manual
     - net: vlan: Make is_vlan_dev() a stub when VLAN is not configured
     - net: vlan: Replace BUG() with WARN_ON_ONCE() in vlan_dev_* stubs
     - gve: Return error for unknown admin queue command
     - [armhf] net: dsa: b53: ensure BCM5325 PHYs are enabled
     - [armhf] net: dsa: b53: fix b53_imp_vlan_setup for BCM5325
     - [armhf] net: dsa: b53: prevent GMII_PORT_OVERRIDE_CTRL access on BCM5325
     - [armhf] net: dsa: b53: prevent DIS_LEARNING access on BCM5325
     - [armhf] net: dsa: b53: prevent SWITCH_CTRL access on BCM5325
     - bpftool: Fix JSON writer resource leak in version command
     - ptp: Use ratelimite for freerun error message
     - wifi: rtw89: scan abort when assign/unassign_vif
     - wifi: rtlwifi: fix possible skb memory leak in _rtl_pci_init_one_rxdesc()
     - ionic: clean dbpage in de-init
     - drm/xe: Make dma-fences compliant with the safe access rules
     - [armhf] net: ncsi: Fix buffer overflow in fetching version id
     - drm/ttm: Should to return the evict error
     - uapi: in6: restore visibility of most IPv6 socket options
     - bpf: Make reg_not_null() true for CONST_PTR_TO_MAP
     - drm/amd/display: Update DMCUB loading sequence for DCN3.5
     - drm/amd/display: Avoid trying AUX transactions on disconnected ports
     - drm/ttm: Respect the shrinker core free target
     - rcu: Fix rcu_read_unlock() deadloop due to IRQ work
     - [armhf] net: dsa: b53: fix IP_MULTICAST_CTRL on BCM5325
     - vsock/virtio: Resize receive buffers so that each SKB fits in a 4K page
     - vhost: fail early when __vhost_add_used() fails
     - drm/amd/display: Only finalize atomic_obj if it was initialized
     - drm/amd/display: Avoid configuring PSR granularity if PSR-SU not supported
     - drm/amd/display: Disable dsc_power_gate for dcn314 by default
     - watchdog: sbsa: Adjust keepalive timeout to avoid MediaTek WS0 race
       condition
     - cifs: Fix calling CIFSFindFirst() for root path without msearch
     - fbdev: fix potential buffer overflow in do_register_framebuffer()
     - crypto: hisilicon/hpre - fix dma unmap sequence
     - ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr
     - [arm64,armhf] clk: tegra: periph: Fix error handling and resolve unsigned
       compare warning
     - mfd: axp20x: Set explicit ID for AXP313 regulator
     - [arm64] phy: rockchip-pcie: Properly disable TEST_WRITE strobe signal
     - scsi: libiscsi: Initialize iscsi_conn->dd_data only if memory is allocated
     - fs/orangefs: use snprintf() instead of sprintf()
     - watchdog: dw_wdt: Fix default timeout
     - hwmon: (emc2305) Set initial PWM minimum value during probe based on
       thermal state
     - [mips*] vpe-mt: add missing prototypes for vpe_{alloc,start,stop,free}
     - watchdog: iTCO_wdt: Report error if timeout configuration fails
     - scsi: bfa: Double-free fix
     - jfs: truncate good inode pages when hard link is 0
     - jfs: Regular file corruption check
     - jfs: upper bound check of tree index in dbAllocAG
     - media: hi556: Fix reset GPIO timings
     - RDMA/bnxt_re: Fix size of uverbs_copy_to() in
       BNXT_RE_METHOD_GET_TOGGLE_MEM
     - crypto: jitter - fix intermediary handling
     - [mips*] Don't crash in stack_top() for tasks without ABI or vDSO
     - [riscv64] clk: thead: Mark essential bus clocks as CLK_IGNORE_UNUSED
     - media: ipu-bridge: Add _HID for OV5670
     - media: v4l2-common: Reduce warnings about missing V4L2_CID_LINK_FREQ
       control
     - leds: leds-lp50xx: Handle reg to get correct multi_index
     - [armhf] dmaengine: stm32-dma: configure next sg only if there are more
       than 2 sgs
     - [amd64] RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()
     - RDMA/core: reduce stack using in nldev_stat_get_doit()
     - scsi: lpfc: Ensure HBA_SETUP flag is used only for SLI4 in
       dev_loss_tmo_callbk
     - scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure
     - power: supply: qcom_battmgr: Add lithium-polymer entry
     - scsi: mpt3sas: Correctly handle ATA device errors
     - scsi: mpi3mr: Correctly handle ATA device errors
     - [armhf] pinctrl: stm32: Manage irq affinity settings
     - media: usb: hdpvr: disable zero-length read messages
     - media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()
     - media: dvb-frontends: w7090p: fix null-ptr-deref in
       w7090p_tuner_write_serpar and w7090p_tuner_read_serpar
     - media: uvcvideo: Add quirk for HP Webcam HD 2300
     - media: uvcvideo: Fix bandwidth issue for Alcor camera
     - [amd64] crypto: ccp - Add missing bootloader info reg for pspv6
     - [arm64] clk: renesas: rzg2l: Postpone updating priv->clks[]
     - soundwire: amd: serialize amd manager resume sequence during pm_prepare
     - soundwire: amd: cancel pending slave status handling workqueue during
       remove sequence
     - soundwire: Move handle_nested_irq outside of sdw_dev_lock
     - md: dm-zoned-target: Initialize return variable r to avoid uninitialized
       use
     - module: Prevent silent truncation of module name in delete_module(2)
     - i3c: add missing include to internal header
     - rtc: ds1307: handle oscillator stop flag (OSF) for ds1341
     - apparmor: shift ouid when mediating hard links in userns
     - i3c: don't fail if GETHDRCAP is unsupported
     - i3c: master: Initialize ret in i3c_i2c_notifier_call()
     - dm-mpath: don't print the "loaded" message if registering fails
     - dm-table: fix checking for rq stackable devices
     - apparmor: use the condition in AA_BUG_FMT even with debug disabled
     - apparmor: fix x_table_lookup when stacking is not the first entry
     - i2c: Force DLL0945 touchpad i2c freq to 100khz
     - exfat: add cluster chain loop check for dir
     - f2fs: check the generic conditions first
     - printk: nbcon: Allow reacquire during panic
     - vfio/type1: conditional rescheduling while pinning
     - scsi: Fix sas_user_scan() to handle wildcard and multi-channel scans
     - scsi: target: core: Generate correct identifiers for PR OUT transport IDs
     - scsi: aacraid: Stop using PCI_IRQ_AFFINITY
     - vfio/mlx5: fix possible overflow in tracking max message size
     - ipmi: Use dev_warn_ratelimited() for incorrect message warnings
     - ipmi: Fix strcpy source and destination the same
     - tools/power turbostat: Handle non-root legacy-uncore sysfs permissions
     - tools/power turbostat: Fix build with musl
     - tools/power turbostat: Handle cap_get_proc() ENOSYS
     - smb: client: don't call init_waitqueue_head(&info->conn_wait) twice in
       _smbd_get_connection
     - lib/sbitmap: convert shallow_depth from one word to the whole sbitmap
     - ALSA: hda/realtek: add LG gram 16Z90R-A to alc269 fixup table
     - net: phy: smsc: add proper reset flags for LAN8710A
     - [amd64] ASoC: Intel: avs: Fix uninitialized pointer error in probe()
     - block: avoid possible overflow for chunk_sectors check in
       blk_stack_limits()
     - pNFS: Fix stripe mapping in block/scsi layout
     - pNFS: Fix disk addr range check in block/scsi layout
     - pNFS: Handle RPC size limit for layoutcommits
     - pNFS: Fix uninited ptr deref in block/scsi layout
     - rtc: ds1307: remove clear of oscillator stop flag (OSF) in probe
     - scsi: lpfc: Remove redundant assignment to avoid memory leak
     - [amd64,armhf] ASoC: fsl_sai: replace regmap_write with regmap_update_bits
     - cifs: Fix collect_sample() to handle any iterator type
     - drm/amdgpu: fix vram reservation issue
     - drm/amdgpu: fix incorrect vm flags to map bo
     - mm/damon/core: commit damos->target_nid
     - block: Introduce bio_needs_zone_write_plugging()
     - dm: Always split write BIOs to zoned device limits
     - cifs: reset iface weights when we cannot find a candidate
     - [amd64] iommu/vt-d: Optimize iotlb_sync_map for non-caching/non-RWBF modes
     - [arm64] iommu/arm-smmu-qcom: Add SM6115 MDSS compatible
     - iommufd: Report unmapped bytes in the error path of iopt_unmap_iova_range
     - iommufd: Prevent ALIGN() overflow
     - ext4: fix zombie groups in average fragment size lists
     - ext4: fix largest free orders lists corruption on mb_optimize_scan switch
     - ext4: initialize superblock fields in the kballoc-test.c kunit tests
     - usb: core: config: Prevent OOB read in SS endpoint companion parsing
     - misc: rtsx: usb: Ensure mmc child device is active when card is present
     - usb: typec: ucsi: Update power_supply on power role change
     - [amd64] comedi: fix race between polling and detaching
     - [amd64] thunderbolt: Fix copy+paste error in match_service_id()
     - cdc-acm: fix race between initial clearing halt and open
     - btrfs: zoned: use filesystem size not disk size for reclaim decision
     - btrfs: abort transaction during log replay if walk_log_tree() failed
     - btrfs: zoned: do not remove unwritten non-data block group
     - btrfs: qgroup: set quota enabled bit if quota disable fails flushing
       reservations
     - btrfs: don't ignore inode missing when replaying log tree
     - btrfs: fix ssd_spread overallocation
     - btrfs: populate otime when logging an inode item
     - btrfs: qgroup: fix qgroup create ioctl returning success after quotas
       disabled
     - btrfs: don't skip remaining extrefs if dir not found during log replay
     - btrfs: clear dirty status from extent buffer on error at insert_new_root()
     - btrfs: fix log tree replay failure due to file with 0 links and extents
     - btrfs: error on missing block group when unaccounting log tree extent
       buffers
     - btrfs: zoned: do not select metadata BG as finish target
     - btrfs: fix iteration bug in __qgroup_excl_accounting()
     - btrfs: do not allow relocation of partially dropped subvolumes
     - xfs: fix scrub trace with null pointer in quotacheck
     - userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry
     - fbdev: Fix vmalloc out-of-bounds write in fast_imageblit
     - net/sched: ets: use old 'nbands' while purging unused classes
     - [amd64,arm64] hv_netvsc: Fix panic during namespace deletion with VF
     - mm, slab: restore NUMA policy support for large kmalloc
     - mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()
     - mm/kmemleak: avoid soft lockup in __kmemleak_do_cleanup()
     - mm/kmemleak: avoid deadlock by moving pr_warn() outside kmemleak_lock
     - media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()
     - media: venus: Fix OOB read due to missing payload bound check
     - media: uvcvideo: Do not mark valid metadata as invalid
     - media: v4l2: Add support for NV12M tiled variants to v4l2_format_info()
     - HID: magicmouse: avoid setting up battery timer when not needed
     - wifi: mac80211: check basic rates validity in sta_link_apply_parameters
     - HID: apple: avoid setting up battery timer for devices without battery
     - mfd: cros_ec: Separate charge-control probing from USB-PD
     - net: Add net_passive_inc() and net_passive_dec().
     - net: better track kernel sockets lifetime (CVE-2025-21884)
     - smb: client: fix netns refcount leak after net_passive changes
     - PCI: Store all PCIe Supported Link Speeds
     - PCI: Allow PCI bridges to go to D3Hot on all non-x86
     - PCI/ACPI: Fix runtime PM ref imbalance on Hot-Plug Capable ports
     - [arm64] dts: ti: k3-j722s-evm: Fix USB2.0_MUX_SEL to select Type-C
     - [arm64] dts: ti: k3-j722s-evm: Fix USB gpio-hog level for Type-C
     - ata: libata-sata: Add link_power_management_supported sysfs attribute
     - io_uring/rw: cast rw->flags assignment to rwf_t
     - drm/amd/display: Allow DCN301 to clear update flags
     - rcu: Fix racy re-initialization of irq_work causing hangs
     - dm: split write BIOs on zone boundaries when zone append is not emulated
     - PCI: Honor Max Link Speed when determining supported speeds
     - ACPI: Return -ENODEV from acpi_parse_spcr() when SPCR support is disabled
 .
   [ Bastian Blank ]
   * [amd64, arm64] Enable MANA_INFINIBAND.
 .
   [ Salvatore Bonaccorso ]
   * [amd64] udeb: kernel-image: Include SPI drivers
   * ext4: don't try to clear the orphan_present feature block device is r/o
     (Closes: #1108271)
   * alloc_fdtable(): change calling conventions.
   * net: ipv4: fix regression in local-broadcast route
 .
   [ Ben Hutchings ]
   * proc: fix missing pde_set_flags() for net proc files
Checksums-Sha1:
 4106c656f8c45f8bc1f169dc4ddbd386cc096b9e 219407 linux_6.12.43-1.dsc
 0993823d04d14e636f1bd70287ef9f5fc3a95ab5 151168676 linux_6.12.43.orig.tar.xz
 15dab66cc029324f9e175f74d9853e0721afa026 1687580 linux_6.12.43-1.debian.tar.xz
 362bf94259b7ed0c8f1400826e65f198ab002d6f 6643 linux_6.12.43-1_source.buildinfo
Checksums-Sha256:
 3a0ade34fe8cbe46ca1e68f9b74db7923d12d3ce14d7702380f87d75b8ed2d43 219407 linux_6.12.43-1.dsc
 325d46f815ef470fe3502d67cfe14ced7ecc727132d6290a13227598b0221d63 151168676 linux_6.12.43.orig.tar.xz
 dab5e6c12aafbeea2a921e3d4740bb75474f6616ef38f1e095320213fc7181ad 1687580 linux_6.12.43-1.debian.tar.xz
 5b96e329814d716808c47a33c6379e5f179943550f7f3488d85fa7701427f1e3 6643 linux_6.12.43-1_source.buildinfo
Files:
 9d0e43d2ebbdc3000dd023a8fa54abbc 219407 kernel optional linux_6.12.43-1.dsc
 3046ea97a17210f07a642be2b57d475a 151168676 kernel optional linux_6.12.43.orig.tar.xz
 53ee06c9dcaa6d6da57aa9916bf23de8 1687580 kernel optional linux_6.12.43-1.debian.tar.xz
 462ea201e0bc883d5a6874c605fd543e 6643 kernel optional linux_6.12.43-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=1Q8e
-----END PGP SIGNATURE-----

Attachment: pgpfT3J1hzTjm.pgp
Description: PGP signature


--- End Message ---

Reply to: