audit: type=1400 audit(1664543649.602:7): avc: denied { open } for pid=7098 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1
audit: type=1400 audit(1664543649.666:8): avc: denied { checkpoint_restore } for pid=7098 comm="syz-executor.0" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1
INFO: task rcu_gp:3 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:rcu_gp state:I stack:30328 pid:3 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rescuer_thread+0x851/0xdb0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task rcu_par_gp:4 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:rcu_par_gp state:I stack:30944 pid:4 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rescuer_thread+0x851/0xdb0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task slub_flushwq:5 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:slub_flushwq state:I stack:30944 pid:5 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rescuer_thread+0x851/0xdb0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task netns:6 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:netns state:I stack:30944 pid:6 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rescuer_thread+0x851/0xdb0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task kworker/0:0H:8 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/0:0H state:I stack:29760 pid:8 ppid:2 flags:0x00004000
Workqueue: 0x0 (events_highpri)
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
worker_thread+0x15f/0x1260
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task mm_percpu_wq:10 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:mm_percpu_wq state:I stack:30944 pid:10 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rescuer_thread+0x851/0xdb0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task rcu_tasks_kthre:11 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:rcu_tasks_kthre state:I stack:29272 pid:11 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rcu_tasks_one_gp+0x3db/0xc10
rcu_tasks_kthread+0x80/0xa0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task kworker/1:0:20 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0 state:I stack:29760 pid:20 ppid:2 flags:0x00004000
Workqueue: 0x0 (rcu_gp)
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
worker_thread+0x15f/0x1260
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task kworker/1:0H:21 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:kworker/1:0H state:I stack:29376 pid:21 ppid:2 flags:0x00004000
Workqueue: 0x0 (kblockd)
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
worker_thread+0x15f/0x1260
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
INFO: task inet_frag_wq:23 blocked for more than 143 seconds.
Not tainted 6.0.0-rc7-next-20220929 #1
"echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
task:inet_frag_wq state:I stack:30704 pid:23 ppid:2 flags:0x00004000
Call Trace:
__schedule+0x893/0x2470
schedule+0xda/0x1b0
rescuer_thread+0x851/0xdb0
kthread+0x2ed/0x3a0
ret_from_fork+0x22/0x30
Showing all locks held in the system:
2 locks held by kworker/u4:0/9:
#0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0
#1: ffff88800861fdb0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0
1 lock held by rcu_tasks_kthre/11:
#0: ffffffff85406890 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc10
1 lock held by khungtaskd/25:
#0: ffffffff85407360 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260
2 locks held by kworker/u4:2/34:
#0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0
#1: ffff88800a02fdb0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0
1 lock held by kmemleak/55:
1 lock held by in:imklog/211:
#0: ffff88800d5fefe8 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100
2 locks held by kworker/u4:5/329:
#0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0
#1: ffff88801d5e7db0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0
2 locks held by kworker/u4:7/334:
#0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0
#1: ffff88801aa8fdb0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0
2 locks held by kworker/u4:9/342:
#0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0
#1: ffff88801d4a7db0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0
2 locks held by kworker/u4:11/832:
#0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0
#1: ffff88803e557db0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0
1 lock held by modprobe/7152:
1 lock held by modprobe/7156:
1 lock held by modprobe/7157:
=============================================
=======================================================
WARNING: The mand mount option has been deprecated and
and is ignored by this kernel. Remove the mand
option from the mount to silence this warning.
=======================================================
tmpfs: Unknown parameter 'permit_directio'
tmpfs: Unknown parameter 'permit_directio'
loop5: detected capacity change from 0 to 127
SELinux: security_context_str_to_sid (staff_u) failed with errno=-22
loop5: detected capacity change from 0 to 127
SELinux: security_context_str_to_sid (staff_u) failed with errno=-22
loop6: detected capacity change from 0 to 264192
loop6: detected capacity change from 0 to 264192
loop1: detected capacity change from 0 to 264192
SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22
loop1: detected capacity change from 0 to 264192
SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22