audit: type=1400 audit(1664543649.602:7): avc: denied { open } for pid=7098 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 audit: type=1400 audit(1664543649.666:8): avc: denied { checkpoint_restore } for pid=7098 comm="syz-executor.0" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 INFO: task rcu_gp:3 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:rcu_gp state:I stack:30328 pid:3 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rescuer_thread+0x851/0xdb0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task rcu_par_gp:4 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:rcu_par_gp state:I stack:30944 pid:4 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rescuer_thread+0x851/0xdb0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task slub_flushwq:5 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:slub_flushwq state:I stack:30944 pid:5 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rescuer_thread+0x851/0xdb0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task netns:6 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:netns state:I stack:30944 pid:6 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rescuer_thread+0x851/0xdb0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task kworker/0:0H:8 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/0:0H state:I stack:29760 pid:8 ppid:2 flags:0x00004000 Workqueue: 0x0 (events_highpri) Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 worker_thread+0x15f/0x1260 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task mm_percpu_wq:10 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:mm_percpu_wq state:I stack:30944 pid:10 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rescuer_thread+0x851/0xdb0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task rcu_tasks_kthre:11 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:rcu_tasks_kthre state:I stack:29272 pid:11 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rcu_tasks_one_gp+0x3db/0xc10 rcu_tasks_kthread+0x80/0xa0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task kworker/1:0:20 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0 state:I stack:29760 pid:20 ppid:2 flags:0x00004000 Workqueue: 0x0 (rcu_gp) Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 worker_thread+0x15f/0x1260 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task kworker/1:0H:21 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/1:0H state:I stack:29376 pid:21 ppid:2 flags:0x00004000 Workqueue: 0x0 (kblockd) Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 worker_thread+0x15f/0x1260 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 INFO: task inet_frag_wq:23 blocked for more than 143 seconds. Not tainted 6.0.0-rc7-next-20220929 #1 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:inet_frag_wq state:I stack:30704 pid:23 ppid:2 flags:0x00004000 Call Trace: __schedule+0x893/0x2470 schedule+0xda/0x1b0 rescuer_thread+0x851/0xdb0 kthread+0x2ed/0x3a0 ret_from_fork+0x22/0x30 Showing all locks held in the system: 2 locks held by kworker/u4:0/9: #0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0 #1: ffff88800861fdb0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0 1 lock held by rcu_tasks_kthre/11: #0: ffffffff85406890 (rcu_tasks.tasks_gp_mutex){+.+.}-{3:3}, at: rcu_tasks_one_gp+0x26/0xc10 1 lock held by khungtaskd/25: #0: ffffffff85407360 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 2 locks held by kworker/u4:2/34: #0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0 #1: ffff88800a02fdb0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0 1 lock held by kmemleak/55: 1 lock held by in:imklog/211: #0: ffff88800d5fefe8 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe7/0x100 2 locks held by kworker/u4:5/329: #0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0 #1: ffff88801d5e7db0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0 2 locks held by kworker/u4:7/334: #0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0 #1: ffff88801aa8fdb0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0 2 locks held by kworker/u4:9/342: #0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0 #1: ffff88801d4a7db0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0 2 locks held by kworker/u4:11/832: #0: ffff888007c61138 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x915/0x16a0 #1: ffff88803e557db0 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x949/0x16a0 1 lock held by modprobe/7152: 1 lock held by modprobe/7156: 1 lock held by modprobe/7157: ============================================= ======================================================= WARNING: The mand mount option has been deprecated and and is ignored by this kernel. Remove the mand option from the mount to silence this warning. ======================================================= tmpfs: Unknown parameter 'permit_directio' tmpfs: Unknown parameter 'permit_directio' loop5: detected capacity change from 0 to 127 SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 loop5: detected capacity change from 0 to 127 SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 loop6: detected capacity change from 0 to 264192 loop6: detected capacity change from 0 to 264192 loop1: detected capacity change from 0 to 264192 SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 loop1: detected capacity change from 0 to 264192 SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22