Closed littoy closed 1 year ago
反馈kernel bug了
Hi, 请问这个问题解决了吗? 这边在 HP t430 / Celeron N4000 物理机上也复现了一样的问题。M.2 WLAN 槽位加装了一块 RTL8111F。 目前在尝试回滚 5.15 内核中。
[ +0.571939] r8168: eth0: link up
[ +0.000662] br-lan: port 1(eth0) entered blocking state
[ +0.000334] br-lan: port 1(eth0) entered forwarding state
[ +0.000697] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[ +17.496441] traps: check[10076] general protection fault ip:8049007 sp:ff94f7c0 error:402 in check[8049000+1000]
[Jan22 11:53] ------------[ cut here ]------------
[ +0.000307] WARNING: CPU: 1 PID: 19 at inet_sock_destruct+0x1a4/0x1e0
[ +0.000418] Modules linked in: shortcut_fe_cm pppoe ppp_async i915 amdgpu wireguard video pppox ppp_mppe ppp_generic libchacha20poly1305 ipt_REJECT curve25519_x86_64 chacha_x86_64 ax88179_178a aqc111 zstd xt_time xt_tcpudp xt_tcpmss xt_statistic xt_state xt_socket xt_recent xt_quota xt_policy xt_pkttype xt_physdev xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_iprange xt_hl xt_helper xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_cgroup xt_addrtype xt_TPROXY xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_HL xt_DSCP xt_CT xt_CLASSIFY wmi via_velocity usbnet ums_usbat ums_sddr55 ums_sddr09 ums_karma ums_jumpshot ums_isd200 ums_freecom ums_datafab ums_cypress ums_alauda tulip ts_fsm ts_bm tcp_bbr slhc sch_cake rtl8150 r8168 r8152 r8125 poly1305_x86_64 pcnet32 nft_reject_ipv6 nft_reject_ipv4 nft_reject_inet nft_reject nft_redir nft_quota nft_objref nft_numgen nft_log nft_limit nft_hash nft_ct nf_tproxy_ipv6 nf_tproxy_ipv4 nf_tables
[ +0.000096] nf_socket_ipv6 nf_socket_ipv4 nf_reject_ipv4 nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda nf_log_syslog nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_pptp nf_conntrack_netlink nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp nf_conntrack_broadcast ts_kmp nf_conntrack_amanda nf_conncount mlx5_core mlx4_en mlx4_core macvlan lzo_rle lzo libcurve25519_generic libchacha iptable_raw iptable_nat iptable_mangle iptable_filter ipt_ah ipt_ECN ip_tables igc iavf i40e gpu_sched forcedeth e1000e drm_display_helper drm_buddy crc_ccitt br_netfilter bnx2x bnx2 asn1_decoder alx 8139too 8139cp ntfs3 sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact evdev i2c_dev cryptodev xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet
[ +0.005734] ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ipmac ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set nfnetlink ip6table_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_NPT ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 bonding ixgbe igbvf e1000 amd_xgbe mdio_devres ifb dummy ip6_udp_tunnel udp_tunnel sit mdio ipcomp6 xfrm6_tunnel esp6 ah6 xfrm4_tunnel ipcomp esp4 ah4 netlink_diag tunnel6 tunnel4 ip_tunnel udp_diag tcp_diag raw_diag inet_diag veth tun xfrm_user xfrm_ipcomp af_key xfrm_algo raid456 async_raid6_recov async_pq async_xor async_memcpy async_tx raid10 raid1 raid0 md_mod nls_utf8 zram zsmalloc ena shortcut_fe_ipv6 shortcut_fe crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha1_ssse3 sha1_generic md5 hmac echainiv des_generic libdes deflate cbc authencesn authenc arc4 crypto_acompress nls_iso8859_1 nls_cp437 uas sdhci_pltfm igb vfat fat exfat btrfs
[ +0.005333] zstd_decompress zstd_compress zstd_common xxhash xor raid6_pq lzo_decompress lzo_compress libcrc32c button_hotplug tg3 mii libphy
[ +0.006035] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 6.1.73 #0
[ +0.000377] Hardware name: HP HP t430 Thin Client/83C3, BIOS N41 v01.14 10/23/2023
[ +0.000472] RIP: 0010:inet_sock_destruct+0x1a4/0x1e0
[ +0.000318] Code: 8b bc 24 40 01 00 00 e8 0a c1 f3 ff 49 8b bc 24 88 00 00 00 e8 fd c0 f3 ff 5b 41 5c 5d c3 41 8b 84 24 08 01 00 00 85 c0 74 c8 <0f> 0b eb c4 4c 89 e7 e8 70 2f f1 ff e9 4b ff ff ff 0f 0b 41 8b 84
[ +0.001151] RSP: 0018:ffffc900000e7da8 EFLAGS: 00010206
[ +0.000327] RAX: 0000000000000100 RBX: ffff888008229d40 RCX: 0000000000000007
[ +0.000443] RDX: ffff888006df1530 RSI: 0000000000000100 RDI: ffff888008229d40
[ +0.000442] RBP: ffffc900000e7db8 R08: ffff8880737ce800 R09: 0000000000200015
[ +0.000444] R10: 0000000040000000 R11: 0000000000000000 R12: ffff888008229c80
[ +0.000440] R13: ffff888002c8d400 R14: ffffc900000e7e28 R15: ffff88806caa40b8
[ +0.000439] FS: 0000000000000000(0000) GS:ffff88806ca80000(0000) knlGS:0000000000000000
[ +0.000503] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ +0.000353] CR2: 00007f8ce9bfa910 CR3: 000000002d14a000 CR4: 0000000000350ee0
[ +0.000443] Call Trace:
[ +0.000161] <TASK>
[ +0.000140] ? show_regs.part.0+0x1e/0x20
[ +0.000262] ? show_regs.cold+0x8/0xd
[ +0.000226] ? __warn+0x6e/0xc0
[ +0.000208] ? inet_sock_destruct+0x1a4/0x1e0
[ +0.000271] ? report_bug+0xed/0x140
[ +0.000229] ? handle_bug+0x46/0x80
[ +0.000224] ? exc_invalid_op+0x19/0x70
[ +0.000244] ? asm_exc_invalid_op+0x1b/0x20
[ +0.000261] ? inet_sock_destruct+0x1a4/0x1e0
[ +0.000270] inet6_sock_destruct+0x16/0x20
[ +0.000261] __sk_destruct+0x23/0x180
[ +0.000228] rcu_core+0x28f/0x690
[ +0.000209] rcu_core_si+0x9/0x10
[ +0.000215] __do_softirq+0xbd/0x1e8
[ +0.000221] run_ksoftirqd+0x24/0x40
[ +0.000234] smpboot_thread_fn+0xdb/0x1d0
[ +0.000255] kthread+0xde/0x110
[ +0.000203] ? sort_range+0x20/0x20
[ +0.000226] ? kthread_complete_and_exit+0x20/0x20
[ +0.000299] ret_from_fork+0x1f/0x30
[ +0.000224] </TASK>
[ +0.000135] ---[ end trace 0000000000000000 ]---
[Jan22 21:01] hrtimer: interrupt took 5301 ns
6.6 内核下此问题似乎已经解决。
6.6.23 内核复现。
继续观测中。
是不是使用了 passwall? 我这边只有在开启 passwall 的情况下才会出现类似的 kernel 问题,用 helloworld 不会出这个问题。
反馈bug/问题模板,提建议请删除
1.关于你要提交的问题
Q:是否搜索了issue (使用 "x" 选择)
2. 详细叙述
(1) 具体问题
A:内核异常
(2) 路由器型号和固件版本
A:intel 7505 x86_64 + pve kvm host
(3) 详细日志
A: Sun Jun 11 23:02:41 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:02:41 2023 kern.info kernel: [39210.778735] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:02:41 2023 kern.info kernel: [39210.780515] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:03:01 2023 kern.info kernel: [39231.230004] igc 0000:05:00.0 eth5: NIC Link is Up 100 Mbps Full Duplex, Flow Control: RX Sun Jun 11 23:03:01 2023 kern.info kernel: [39231.232791] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:03:01 2023 kern.info kernel: [39231.234056] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:03:01 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:03:15 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:03:15 2023 kern.info kernel: [39245.340970] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:03:15 2023 kern.info kernel: [39245.342422] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:03:18 2023 kern.info kernel: [39247.621179] igc 0000:05:00.0 eth5: NIC Link is Up 100 Mbps Full Duplex, Flow Control: RX Sun Jun 11 23:03:18 2023 kern.info kernel: [39247.623059] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:03:18 2023 kern.info kernel: [39247.623981] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:03:18 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:03:49 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:03:49 2023 kern.info kernel: [39278.783265] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:03:49 2023 kern.info kernel: [39278.784302] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:03:52 2023 kern.info kernel: [39282.107399] igc 0000:05:00.0 eth5: NIC Link is Up 2500 Mbps Full Duplex, Flow Control: RX/TX Sun Jun 11 23:03:52 2023 kern.info kernel: [39282.109761] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:03:52 2023 kern.info kernel: [39282.111063] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:03:52 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:16:47 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:16:47 2023 kern.info kernel: [40056.879874] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:16:47 2023 kern.info kernel: [40056.881702] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:16:49 2023 kern.info kernel: [40059.088058] igc 0000:05:00.0 eth5: NIC Link is Up 10 Mbps Half Duplex, Flow Control: None Sun Jun 11 23:16:49 2023 kern.info kernel: [40059.090302] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:16:49 2023 kern.info kernel: [40059.091758] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:16:49 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:16:50 2023 kern.info kernel: [40059.511731] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:16:50 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:16:50 2023 kern.info kernel: [40060.099637] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:16:54 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:16:54 2023 kern.info kernel: [40063.523816] igc 0000:05:00.0 eth5: NIC Link is Up 100 Mbps Full Duplex, Flow Control: RX Sun Jun 11 23:16:54 2023 kern.info kernel: [40063.524879] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:16:54 2023 kern.info kernel: [40063.525354] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:17:18 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:17:18 2023 kern.info kernel: [40087.994321] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:17:18 2023 kern.info kernel: [40087.995991] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:17:20 2023 kern.info kernel: [40090.230494] igc 0000:05:00.0 eth5: NIC Link is Up 100 Mbps Full Duplex, Flow Control: RX Sun Jun 11 23:17:20 2023 kern.info kernel: [40090.232615] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:17:20 2023 kern.info kernel: [40090.233612] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:17:20 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:17:23 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:17:23 2023 kern.info kernel: [40093.174017] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:17:23 2023 kern.info kernel: [40093.174883] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:17:27 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:17:27 2023 kern.info kernel: [40096.574134] igc 0000:05:00.0 eth5: NIC Link is Up 2500 Mbps Full Duplex, Flow Control: RX/TX Sun Jun 11 23:17:27 2023 kern.info kernel: [40096.575504] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:17:27 2023 kern.info kernel: [40096.576213] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:21:46 2023 kern.info kernel: [40355.969080] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:21:46 2023 kern.info kernel: [40355.971393] br-switch: port 6(eth5) entered disabled state Sun Jun 11 23:21:46 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:21:48 2023 daemon.notice netifd: Network device 'eth5' link is up Sun Jun 11 23:21:48 2023 kern.info kernel: [40358.172964] igc 0000:05:00.0 eth5: NIC Link is Up 10 Mbps Half Duplex, Flow Control: None Sun Jun 11 23:21:48 2023 kern.info kernel: [40358.174528] br-switch: port 6(eth5) entered blocking state Sun Jun 11 23:21:48 2023 kern.info kernel: [40358.175263] br-switch: port 6(eth5) entered forwarding state Sun Jun 11 23:21:49 2023 kern.info kernel: [40359.116622] igc 0000:05:00.0 eth5: NIC Link is Down Sun Jun 11 23:21:49 2023 daemon.notice netifd: Network device 'eth5' link is down Sun Jun 11 23:21:49 2023 kern.info kernel: [40359.176511] br-switch: port 6(eth5) entered disabled state Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.484929] ------------[ cut here ]------------ Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.485419] WARNING: CPU: 1 PID: 19 at inet_sock_destruct+0x194/0x1c0 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.485879] Modules linked in: pppoe ppp_async l2tp_ppp i915 wireguard video sch_fq_pie pppox ppp_mppe ppp_generic mt7921e mt7921_common mt7915e mt76_connac_lib mt76 mac80211 libchacha20poly1305 ipt_REJECT curve25519_x86_64 chacha_x86_64 cfg80211 ax88179_178a zstd xt_time xt_tcpudp xt_tcpmss xt_string xt_statistic xt_state xt_socket xt_recent xt_quota xt_policy xt_pkttype xt_owner xt_nat xt_multiport xt_mark xt_mac xt_limit xt_length xt_iprange xt_hl xt_helper xt_hashlimit xt_esp xt_ecn xt_dscp xt_conntrack xt_connmark xt_connlimit xt_connbytes xt_comment xt_cgroup xt_bpf xt_addrtype xt_TPROXY xt_TCPMSS xt_REDIRECT xt_MASQUERADE xt_LOG xt_IPMARK xt_HL xt_FLOWOFFLOAD xt_DSCP xt_CT xt_CLASSIFY wmi via_velocity usbnet ums_usbat ums_sddr55 ums_sddr09 ums_karma ums_jumpshot ums_isd200 ums_freecom ums_datafab ums_cypress ums_alauda tulip ts_fsm ts_bm tcp_bbr slhc sch_pie sch_cake rtl8150 r8168 r8152 r8125 poly1305_x86_64 pcnet32 nf_tproxy_ipv6 nf_tproxy_ipv4 nf_socket_ipv6 nf_socket_ipv4 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.485925] nf_reject_ipv4 nf_nat_tftp nf_nat_snmp_basic nf_nat_sip nf_nat_pptp nf_nat_irc nf_nat_h323 nf_nat_ftp nf_nat_amanda nf_log_syslog nf_flow_table nf_conntrack_tftp nf_conntrack_snmp nf_conntrack_sip nf_conntrack_pptp nf_conntrack_netlink nf_conntrack_irc nf_conntrack_h323 nf_conntrack_ftp nf_conntrack_broadcast ts_kmp nf_conntrack_amanda nf_conncount mlx5_core mlx4_en mlx4_core mdev macvlan lzo_rle lzo libcurve25519_generic libchacha ipvlan iptable_raw iptable_nat iptable_mangle iptable_filter ipt_ah ipt_ECN ip_tables iommu_v2 igc iavf i40e forcedeth e1000e drm_display_helper drm_buddy crc_ccitt compat_xtables compat cls_flower br_netfilter bnx2x bnx2 alx act_vlan 8139too 8139cp ntfs3 cls_bpf act_bpf sch_tbf sch_ingress sch_htb sch_hfsc em_u32 cls_u32 cls_route cls_matchall cls_fw cls_flow cls_basic act_skbedit act_mirred act_gact configs sg evdev i2c_dev cryptodev xt_set ip_set_list_set ip_set_hash_netportnet ip_set_hash_netport ip_set_hash_netnet ip_set_hash_netiface Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.491026] ip_set_hash_net ip_set_hash_mac ip_set_hash_ipportnet ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ipmark ip_set_hash_ipmac ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set st ip6table_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip6t_NPT ip6table_mangle ip6table_filter ip6_tables ip6t_REJECT x_tables nf_reject_ipv6 nfsv4 nfsd nfs bonding ip_gre gre ixgbe igbvf e1000 amd_xgbe mdio_devres dummy sit mdio l2tp_netlink l2tp_core udp_tunnel ip6_udp_tunnel ipcomp6 xfrm6_tunnel esp6 ah6 xfrm4_tunnel ipcomp esp4 ah4 ipip tunnel6 tunnel4 ip_tunnel udp_diag tcp_diag raw_diag inet_diag rpcsec_gss_krb5 auth_rpcgss veth tun nbd xfrm_user xfrm_ipcomp af_key xfrm_algo virtiofs fuse lockd sunrpc grace hfs cifs oid_registry cifs_md4 cifs_arc4 asn1_decoder dns_resolver md_mod nls_utf8 nls_cp950 nls_cp936 ena shortcut_fe_ipv6 shortcut_fe crypto_user algif_skcipher algif_rng algif_hash algif_aead af_alg sha512_ssse3 sha512_generic sha1_ssse3 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.496627] sha1_generic seqiv jitterentropy_rng drbg md5 hmac echainiv des_generic libdes deflate cts cmac authencesn authenc arc4 crypto_acompress nls_iso8859_1 nls_cp437 uas sdhci_pltfm xhci_plat_hcd fsl_mph_dr_of ehci_platform ehci_fsl igb vfat fat exfat btrfs zstd_decompress zstd_compress zstd_common xxhash xor raid6_pq lzo_decompress lzo_compress dm_mirror dm_region_hash dm_log dm_crypt dm_mod dax button_hotplug mii libphy tpm cbc sha256_ssse3 sha256_generic libsha256 encrypted_keys trusted Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.505736] CPU: 1 PID: 19 Comm: ksoftirqd/1 Not tainted 6.1.33 #0 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.506316] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.1-0-g3208b098f51a-prebuilt.qemu.org 04/01/2014 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.507011] RIP: 0010:inet_sock_destruct+0x194/0x1c0 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.507501] Code: bc 24 40 01 00 00 e8 db e3 ef ff 49 8b bc 24 88 00 00 00 e8 ce e3 ef ff 5b 41 5c 5d c3 4c 89 e7 e8 51 4c ed ff e9 70 ff ff ff <0f> 0b eb c3 0f 0b 41 8b 84 24 54 01 00 00 85 c0 74 9d 0f 0b 41 8b Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.509215] RSP: 0018:ffffc900000afda8 EFLAGS: 00010206 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.509721] RAX: 0000000000000b00 RBX: ffff88800c25ccc0 RCX: 0000000000000007 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.510258] RDX: 0000000000000000 RSI: 0000000000000b00 RDI: ffff88800c25ccc0 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.511171] RBP: ffffc900000afdb8 R08: ffff88800954b500 R09: 000000000020000f Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.512245] R10: 0000000040000000 R11: 0000000000000002 R12: ffff88800c25cc00 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.512986] R13: ffff888002d31540 R14: ffffc900000afe28 R15: ffff88807dd253f8 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.514111] FS: 0000000000000000(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.517487] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.518175] CR2: 00007f46611b84c0 CR3: 000000000240a006 CR4: 0000000000370ee0 Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.518784] Call Trace: Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.519313]
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.519657] ? show_regs.part.0+0x1e/0x20
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.520042] ? show_regs.cold+0x8/0xd
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.520448] ? __warn+0x72/0xc0
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.520839] ? inet_sock_destruct+0x194/0x1c0
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.521371] ? report_bug+0xf1/0x140
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.521737] ? handle_bug+0x46/0x80
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.522087] ? exc_invalid_op+0x1d/0x70
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.522467] ? asm_exc_invalid_op+0x1f/0x30
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.522851] ? inet_sock_destruct+0x194/0x1c0
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.523277] inet6_sock_destruct+0x1a/0x20
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.523651] sk_destruct+0x27/0x180
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.523995] rcu_core+0x28f/0x6a0
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.524367] rcu_core_si+0xd/0x10
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.524701] do_softirq+0xc1/0x1ec
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.525155] run_ksoftirqd+0x28/0x40
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.525517] smpboot_thread_fn+0xdf/0x1d0
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.525862] kthread+0xe2/0x110
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.526222] ? sort_range+0x30/0x30
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.526538] ? kthread_complete_and_exit+0x20/0x20
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.526893] ret_from_fork+0x1f/0x30
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.527210]
Mon Jun 12 08:06:15 2023 kern.warn kernel: [71823.527448] ---[ end trace 0000000000000000 ]---
Mon Jun 12 08:11:06 2023 authpriv.info dropbear[5153]: Child connection from 192.168.125.32:50767
Mon Jun 12 08:11:06 2023 authpriv.notice dropbear[5153]: Pubkey auth succeeded for 'root' with ssh-rsa key SHA256:37RoS1zkDfuYSTf+3aQTaROzT0I6Y68UsJ0ccGWnfio from 192.168.125.32:50767
Mon Jun 12 08:12:19 2023 daemon.notice ttyd[10753]: [2023/06/12 08:12:19:8845] N: rops_handle_POLLIN_netlink: DELADDR
Mon Jun 12 08:12:19 2023 daemon.notice ttyd[10753]: [2023/06/12 08:12:19:8871] N: rops_handle_POLLIN_netlink: DELADDR
Mon Jun 12 08:16:51 2023 authpriv.info dropbear[5153]: Exit (root) from <192.168.125.32:50767>: Disconnect received