| c57b0f80-6730-40a9-bc15-a6bff5c8f42d |
patching |
|
💥 |
WARNING in ADDR_ctrl_msg/usb_submit_urb |
2026/03/24 12:07 |
2026/03/24 12:07 |
2026/03/24 12:17 |
971831e4896625f799f350fe4439dc0774b7154a+ |
Kernel failed to boot: WARNING in set_cpu_sibling_map
kvm-guest: setup PV IPIs
..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1
clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x2b24529d36c, max_idle_ns: 440795353363 ns
Calibrating delay loop (skipped) preset value.. 5985.93 BogoMIPS (lpj=29929680)
x86/cpu: User Mode Instruction Prevention (UMIP) activated
Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0
Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0
mitigations: Enabled attack vectors: user_kernel, user_user, guest_host, guest_guest, SMT mitigations: auto
Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl
Spectre V2 : Mitigation: IBRS
RETBleed: Mitigation: IBRS
MDS: Mitigation: Clear CPU buffers
TAA: Mitigation: Clear CPU buffers
MMIO Stale Data: Mitigation: Clear CPU buffers
Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization
Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT
Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier
Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall and VM exit
x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers'
x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers'
x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers'
x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers'
x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR'
x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask'
x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256'
x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256'
x86/fpu: Supporting XSAVE feature 0x200: 'Protection Keys User registers'
x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256
x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64
x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64
x86/fpu: xstate_offset[5]: 960, xstate_sizes[5]: 64
x86/fpu: xstate_offset[6]: 1024, xstate_sizes[6]: 512
x86/fpu: xstate_offset[7]: 1536, xstate_sizes[7]: 1024
x86/fpu: xstate_offset[9]: 2560, xstate_sizes[9]: 8
x86/fpu: Enabled xstate features 0x2ff, context size is 2568 bytes, using 'compacted' format.
Freeing SMP alternatives memory: 132K
pid_max: default: 32768 minimum: 301
landlock: Up and running.
Yama: becoming mindful.
TOMOYO Linux initialized
AppArmor: AppArmor initialized
LSM support for eBPF active
Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, vmalloc hugepage)
Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, vmalloc)
Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, vmalloc)
Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, vmalloc)
VFS: Finished mounting rootfs on nullfs
Running RCU synchronous self tests
Running RCU synchronous self tests
------------[ cut here ]------------
WARNING: arch/x86/kernel/smpboot.c:698 at set_cpu_sibling_map+0xe41/0x1f90 arch/x86/kernel/smpboot.c:698, CPU#1: swapper/1/0
Modules linked in:
CPU: 1 UID: 0 PID: 0 Comm: swapper/1 Not tainted syzkaller #1 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:set_cpu_sibling_map+0xe41/0x1f90 arch/x86/kernel/smpboot.c:698
Code: 0f 0b 90 e9 6a fa ff ff e8 5c 4e 51 00 90 0f 0b 90 e9 c2 f5 ff ff e8 4e 4e 51 00 90 0f 0b 90 e9 67 fd ff ff e8 40 4e 51 00 90 <0f> 0b 90 e9 e0 f4 ff ff e8 32 4e 51 00 4c 8d 3d 5b a2 a0 0e 89 df
RSP: 0000:ffffc9000046fdb8 EFLAGS: 00010093
RAX: ffffffff8172a9a0 RBX: 0000000000000001 RCX: ffff8880404a8000
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001
RBP: ffffffff8e0e5790 R08: ffffffff931f1007 R09: 1ffffffff263e200
R10: dffffc0000000000 R11: fffffbfff263e201 R12: 0000000000000000
R13: dffffc0000000000 R14: ffffffff8e0e5798 R15: 0000000000000001
FS: 0000000000000000(0000) GS:ffff8880ebc87000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000000 CR3: 000000000e542000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
<TASK>
ap_starting+0xa4/0x150 arch/x86/kernel/smpboot.c:196
start_s |