Warning: Permanently added '10.128.1.63' (ECDSA) to the list of known hosts. [ 40.463908] IPVS: ftp: loaded support on port[0] = 21 [ 40.528728] chnl_net:caif_netlink_parms(): no params data found [ 40.572292] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.578834] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.586422] device bridge_slave_0 entered promiscuous mode [ 40.593838] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.600183] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.607681] device bridge_slave_1 entered promiscuous mode [ 40.624163] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 40.632908] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 40.650414] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 40.657558] team0: Port device team_slave_0 added [ 40.663577] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 40.670558] team0: Port device team_slave_1 added [ 40.685432] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 40.691724] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.717539] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 40.729207] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 40.735984] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 40.761223] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 40.775148] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 40.782549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 40.799832] device hsr_slave_0 entered promiscuous mode [ 40.805833] device hsr_slave_1 entered promiscuous mode [ 40.812432] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 40.819290] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 40.876573] bridge0: port 2(bridge_slave_1) entered blocking state [ 40.882972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 40.889702] bridge0: port 1(bridge_slave_0) entered blocking state [ 40.896079] bridge0: port 1(bridge_slave_0) entered forwarding state [ 40.923497] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 40.929554] 8021q: adding VLAN 0 to HW filter on device bond0 [ 40.938036] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 40.946362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 40.965283] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.972261] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.981492] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 40.987546] 8021q: adding VLAN 0 to HW filter on device team0 [ 40.995878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 41.004243] bridge0: port 1(bridge_slave_0) entered blocking state [ 41.010630] bridge0: port 1(bridge_slave_0) entered forwarding state [ 41.019402] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 41.027260] bridge0: port 2(bridge_slave_1) entered blocking state [ 41.033623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 41.051228] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 41.058787] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 41.066465] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 41.074286] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 41.083403] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 41.093901] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 41.099872] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 41.107400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 41.120798] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 41.127777] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 41.134671] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 41.144542] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 41.192256] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 41.203036] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 41.226459] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 41.233410] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 41.239744] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 41.248904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 41.256325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 41.263272] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 41.271830] device veth0_vlan entered promiscuous mode [ 41.280314] device veth1_vlan entered promiscuous mode [ 41.286421] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 41.294483] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 41.305493] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 41.314237] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 41.321653] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 41.328723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 41.338229] device veth0_macvtap entered promiscuous mode [ 41.344459] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 41.353347] device veth1_macvtap entered promiscuous mode [ 41.361823] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 41.370538] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 41.379721] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 41.387616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 41.395729] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 41.405518] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 41.413010] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready executing program [ 41.493525] FAULT_INJECTION: forcing a failure. [ 41.493525] name failslab, interval 1, probability 0, space 0, times 1 [ 41.505148] CPU: 1 PID: 8238 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0 [ 41.513002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 41.522328] Call Trace: [ 41.524892] dump_stack+0x1b2/0x281 [ 41.528492] should_fail.cold+0x10a/0x149 [ 41.532616] should_failslab+0xd6/0x130 [ 41.536567] __kmalloc+0x6d/0x400 [ 41.539991] ? tty_buffer_alloc+0xc0/0x270 [ 41.544199] tty_buffer_alloc+0xc0/0x270 [ 41.548796] __tty_buffer_request_room+0x12c/0x290 [ 41.553696] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 41.559207] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 41.565149] pty_write+0xc3/0xf0 [ 41.568489] n_tty_write+0x85e/0xda0 [ 41.572178] ? n_tty_open+0x160/0x160 [ 41.575957] ? do_wait_intr_irq+0x270/0x270 [ 41.580250] ? __might_fault+0x177/0x1b0 [ 41.584281] tty_write+0x410/0x740 [ 41.587798] ? n_tty_open+0x160/0x160 [ 41.591571] __vfs_write+0xe4/0x630 [ 41.595168] ? tty_compat_ioctl+0x240/0x240 [ 41.599458] ? __handle_mm_fault+0x80f/0x4620 [ 41.603922] ? kernel_read+0x110/0x110 [ 41.607798] ? common_file_perm+0x3ee/0x580 [ 41.612091] ? security_file_permission+0x82/0x1e0 [ 41.616992] ? rw_verify_area+0xe1/0x2a0 [ 41.621022] vfs_write+0x17f/0x4d0 [ 41.624534] SyS_write+0xf2/0x210 [ 41.627961] ? SyS_read+0x210/0x210 [ 41.631558] ? __do_page_fault+0x159/0xad0 [ 41.635764] ? do_syscall_64+0x4c/0x640 [ 41.639864] ? SyS_read+0x210/0x210 [ 41.643471] do_syscall_64+0x1d5/0x640 [ 41.647337] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 41.652514] RIP: 0033:0x7efe98debb99 [ 41.656198] RSP: 002b:00007fff790853c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 41.663875] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007efe98debb99 [ 41.671118] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000003 [ 41.678450] RBP: 00007fff790853e0 R08: 0000000000000001 R09: 0000000000000001 [ 41.685695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 41.692937] R13: 00000000000f4240 R14: 0000000000000000 R15: 0000000000000000 [ 41.700186] [ 41.700188] ====================================================== [ 41.700190] WARNING: possible circular locking dependency detected [ 41.700192] 4.14.302-syzkaller #0 Not tainted [ 41.700193] ------------------------------------------------------ [ 41.700195] syz-executor114/8238 is trying to acquire lock: [ 41.700196] (console_owner){....}, at: [] console_unlock+0x307/0xf20 [ 41.700200] [ 41.700201] but task is already holding lock: [ 41.700202] (&(&port->lock)->rlock){-.-.}, at: [] tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 41.700206] [ 41.700208] which lock already depends on the new lock. [ 41.700209] [ 41.700209] [ 41.700211] the existing dependency chain (in reverse order) is: [ 41.700212] [ 41.700212] -> #2 (&(&port->lock)->rlock){-.-.}: [ 41.700217] _raw_spin_lock_irqsave+0x8c/0xc0 [ 41.700218] tty_port_tty_get+0x1d/0x80 [ 41.700219] tty_port_default_wakeup+0x11/0x40 [ 41.700221] serial8250_tx_chars+0x3fe/0xc70 [ 41.700222] serial8250_handle_irq.part.0+0x2c7/0x390 [ 41.700224] serial8250_default_handle_irq+0x8a/0x1f0 [ 41.700225] serial8250_interrupt+0xf3/0x210 [ 41.700227] __handle_irq_event_percpu+0xee/0x7f0 [ 41.700228] handle_irq_event+0xed/0x240 [ 41.700229] handle_edge_irq+0x224/0xc40 [ 41.700230] handle_irq+0x35/0x50 [ 41.700231] do_IRQ+0x93/0x1d0 [ 41.700233] ret_from_intr+0x0/0x1e [ 41.700234] native_safe_halt+0xe/0x10 [ 41.700235] default_idle+0x47/0x370 [ 41.700236] do_idle+0x250/0x3c0 [ 41.700237] cpu_startup_entry+0x14/0x20 [ 41.700238] start_kernel+0x743/0x763 [ 41.700240] secondary_startup_64+0xa5/0xb0 [ 41.700240] [ 41.700241] -> #1 (&port_lock_key){-.-.}: [ 41.700247] _raw_spin_lock_irqsave+0x8c/0xc0 [ 41.700249] serial8250_console_write+0x8cb/0xb40 [ 41.700252] console_unlock+0x99d/0xf20 [ 41.700253] vprintk_emit+0x224/0x620 [ 41.700256] vprintk_func+0x58/0x160 [ 41.700257] printk+0x9e/0xbc [ 41.700260] register_console+0x6f4/0xad0 [ 41.700262] univ8250_console_init+0x2f/0x3a [ 41.700264] console_init+0x46/0x53 [ 41.700266] start_kernel+0x521/0x763 [ 41.700268] secondary_startup_64+0xa5/0xb0 [ 41.700269] [ 41.700271] -> #0 (console_owner){....}: [ 41.700277] lock_acquire+0x170/0x3f0 [ 41.700278] console_unlock+0x36f/0xf20 [ 41.700279] vprintk_emit+0x224/0x620 [ 41.700281] vprintk_func+0x58/0x160 [ 41.700282] printk+0x9e/0xbc [ 41.700283] should_fail.cold+0xdf/0x149 [ 41.700284] should_failslab+0xd6/0x130 [ 41.700285] __kmalloc+0x6d/0x400 [ 41.700287] tty_buffer_alloc+0xc0/0x270 [ 41.700288] __tty_buffer_request_room+0x12c/0x290 [ 41.700290] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 41.700292] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 41.700293] pty_write+0xc3/0xf0 [ 41.700294] n_tty_write+0x85e/0xda0 [ 41.700295] tty_write+0x410/0x740 [ 41.700296] __vfs_write+0xe4/0x630 [ 41.700297] vfs_write+0x17f/0x4d0 [ 41.700298] SyS_write+0xf2/0x210 [ 41.700300] do_syscall_64+0x1d5/0x640 [ 41.700301] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 41.700302] [ 41.700303] other info that might help us debug this: [ 41.700304] [ 41.700305] Chain exists of: [ 41.700306] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 41.700311] [ 41.700312] Possible unsafe locking scenario: [ 41.700313] [ 41.700314] CPU0 CPU1 [ 41.700315] ---- ---- [ 41.700316] lock(&(&port->lock)->rlock); [ 41.700319] lock(&port_lock_key); [ 41.700322] lock(&(&port->lock)->rlock); [ 41.700324] lock(console_owner); [ 41.700326] [ 41.700327] *** DEADLOCK *** [ 41.700328] [ 41.700329] 6 locks held by syz-executor114/8238: [ 41.700330] #0: (&tty->ldisc_sem){++++}, at: [] tty_ldisc_ref_wait+0x22/0x80 [ 41.700334] #1: (&tty->atomic_write_lock){+.+.}, at: [] tty_write+0x22d/0x740 [ 41.700339] #2: (&tty->termios_rwsem){++++}, at: [] n_tty_write+0x18a/0xda0 [ 41.700343] #3: (&ldata->output_lock){+.+.}, at: [] n_tty_write+0x82b/0xda0 [ 41.700348] #4: (&(&port->lock)->rlock){-.-.}, at: [] tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 41.700353] #5: (console_lock){+.+.}, at: [] vprintk_func+0x58/0x160 [ 41.700357] [ 41.700358] stack backtrace: [ 41.700360] CPU: 1 PID: 8238 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0 [ 41.700362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 41.700363] Call Trace: [ 41.700364] dump_stack+0x1b2/0x281 [ 41.700366] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 41.700367] __lock_acquire+0x2e0e/0x3f20 [ 41.700369] ? trace_hardirqs_on+0x10/0x10 [ 41.700370] ? snprintf+0xd0/0xd0 [ 41.700371] ? console_unlock+0x34a/0xf20 [ 41.700372] lock_acquire+0x170/0x3f0 [ 41.700373] ? console_unlock+0x307/0xf20 [ 41.700374] console_unlock+0x36f/0xf20 [ 41.700376] ? console_unlock+0x307/0xf20 [ 41.700377] vprintk_emit+0x224/0x620 [ 41.700378] vprintk_func+0x58/0x160 [ 41.700379] printk+0x9e/0xbc [ 41.700380] ? log_store.cold+0x16/0x16 [ 41.700381] ? ___ratelimit+0x2b5/0x510 [ 41.700383] should_fail.cold+0xdf/0x149 [ 41.700384] should_failslab+0xd6/0x130 [ 41.700385] __kmalloc+0x6d/0x400 [ 41.700386] ? tty_buffer_alloc+0xc0/0x270 [ 41.700387] tty_buffer_alloc+0xc0/0x270 [ 41.700389] __tty_buffer_request_room+0x12c/0x290 [ 41.700390] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 41.700392] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 41.700393] pty_write+0xc3/0xf0 [ 41.700394] n_tty_write+0x85e/0xda0 [ 41.700395] ? n_tty_open+0x160/0x160 [ 41.700396] ? do_wait_intr_irq+0x270/0x270 [ 41.700398] ? __might_fault+0x177/0x1b0 [ 41.700399] tty_write+0x410/0x740 [ 41.700400] ? n_tty_open+0x160/0x160 [ 41.700401] __vfs_write+0xe4/0x630 [ 41.700402] ? tty_compat_ioctl+0x240/0x240 [ 41.700404] ? __handle_mm_fault+0x80f/0x4620 [ 41.700405] ? kernel_read+0x110/0x110 [ 41.700406] ? common_file_perm+0x3ee/0x580 [ 41.700407] ? security_file_permission+0x82/0x1e0 [ 41.700409] ? rw_verify_area+0xe1/0x2a0 [ 41.700410] vfs_write+0x17f/0x4d0 [ 41.700411] SyS_write+0xf2/0x210 [ 41.700412] ? SyS_read+0x210/0x210 [ 41.700413] ? __do_page_fault+0x159/0xad0 [ 41.700414] ? do_syscall_64+0x4c/0x640 [ 41.700415] ? SyS_read+0x210/0x210 [ 41.700417] do_syscall_64+0x1d5/0x640 [ 41.700418] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 41.700419] RIP: 0033:0x7efe98debb99 [ 41.700421] RSP: 002b:00007fff790853c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 41.700424] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007efe98debb99 [ 41.700426] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000003 [ 41.700428] RBP: 00007fff790853e0 R08: 0000000000000001 R09: 0000000000000001 [ 41.700430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 41.700432] R13: 00000000000f4240 R14: 0000000000000000 R15: 0000000000000000 [ 42.401653] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready executing program [ 46.491577] FAULT_INJECTION: forcing a failure. [ 46.491577] name failslab, interval 1, probability 0, space 0, times 0 [ 46.502757] CPU: 0 PID: 8239 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0 [ 46.510607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 46.519933] Call Trace: [ 46.522495] dump_stack+0x1b2/0x281 [ 46.526100] should_fail.cold+0x10a/0x149 [ 46.530229] should_failslab+0xd6/0x130 [ 46.534181] __kmalloc+0x6d/0x400 [ 46.537717] ? tty_buffer_alloc+0xc0/0x270 [ 46.541933] tty_buffer_alloc+0xc0/0x270 [ 46.545968] __tty_buffer_request_room+0x12c/0x290 [ 46.550891] tty_insert_flip_string_fixed_flag+0x8b/0x210 [ 46.556412] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 46.562361] pty_write+0xc3/0xf0 [ 46.565702] n_tty_write+0x85e/0xda0 [ 46.569397] ? lock_downgrade+0x740/0x740 [ 46.573520] ? n_tty_open+0x160/0x160 [ 46.577297] ? do_wait_intr_irq+0x270/0x270 [ 46.581591] ? __might_fault+0x177/0x1b0 [ 46.585626] tty_write+0x410/0x740 [ 46.589144] ? n_tty_open+0x160/0x160 [ 46.592920] __vfs_write+0xe4/0x630 [ 46.596522] ? tty_compat_ioctl+0x240/0x240 [ 46.600820] ? __handle_mm_fault+0x80f/0x4620 [ 46.605292] ? kernel_read+0x110/0x110 [ 46.609152] ? common_file_perm+0x3ee/0x580 [ 46.613447] ? __fsnotify_inode_delete+0x20/0x20 [ 46.618174] ? __fsnotify_update_child_dentry_flags.part.0+0x2e0/0x2e0 [ 46.624813] ? security_file_permission+0x82/0x1e0 [ 46.629713] ? rw_verify_area+0xe1/0x2a0 [ 46.633753] vfs_write+0x17f/0x4d0 [ 46.637265] SyS_write+0xf2/0x210 [ 46.640780] ? SyS_read+0x210/0x210 [ 46.644379] ? __do_page_fault+0x159/0xad0 [ 46.648590] ? SyS_read+0x210/0x210 [ 46.652193] do_syscall_64+0x1d5/0x640 [ 46.656061] entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 46.661223] RIP: 0033:0x7efe98debb99 [ 46.664906] RSP: 002b:00007fff790853c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 46.672584] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007efe98debb99 [ 46.679831] RDX: 0000000000000004 RSI: 0000000020000040 RDI: 0000000000000003 [ 46.687073] RBP: 00007fff790853e0 R08: 0000000000000001 R09: 0000000900000001 [ 46.694332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 46.701571] R13: 00000000000f4240 R14: 000000000000a22f R15: 00007fff790853d4 executing program [ 51.491658] FAULT_INJECTION: forcing a failure. [ 51.491658] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 51.503447] CPU: 0 PID: 8240 Comm: syz-executor114 Not tainted 4.14.302-syzkaller #0 [ 51.511304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 51.520630] Call Trace: [ 51.523192] dump_stack+0x1b2/0x281 [ 51.526793] should_fail.cold+0x10a/0x149 [ 51.530922] ? trace_hardirqs_on+0x10/0x10 [ 51.535131] __alloc_pages_nodemask+0x21e/0x2900 [ 51.539867] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 51.544945] ? trace_hardirqs_on+0x10/0x10 [ 51.549168] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 51.555028] ? kasan_kmalloc+0x139/0x160 [ 51.559071] ? unwind_next_frame+0xe54/0x17d0 [ 51.563540] ? __save_stack_trace+0x63/0x160 [ 51.567924] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 51.572831] ? __read_once_size_nocheck.constprop.0+0x10/0x10 [ 51.578698] ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 51.584035] ? is_bpf_text_address+0xb8/0x150 [ 51.588508] ? kernel_text_address+0xbd/0xf0 [ 51.592893] alloc_pages_current+0x155/0x260 [ 51.597284] depot_save_stack+0x3ae/0x3f0 [ 51.601410] kasan_slab_free+0x117/0x1a0 [ 51.605445] ? kasan_slab_free+0xc3/0x1a0 [ 51.609571] ? kfree+0xc9/0x250 [ 51.612825] ? kvfree+0x45/0x50 [ 51.616079] ? __vunmap+0x20f/0x300 [ 51.619704] ? vfree+0x4b/0xd0 [ 51.622876] ? n_tty_close+0xb2/0x1f0 [ 51.626650] ? tty_ldisc_close+0x8c/0xc0 [ 51.630684] ? tty_ldisc_hangup+0x269/0x6c0 [ 51.634977] ? __tty_hangup.part.0+0x31a/0x730 [ 51.639529] ? tty_vhangup+0x1d/0x30 [ 51.643220] ? pty_close+0x35f/0x4b0 [ 51.646911] ? tty_release+0x40b/0x10d0 [ 51.650859] ? __fput+0x25f/0x7a0 [ 51.654372] ? task_work_run+0x11f/0x190 [ 51.658406] ? exit_to_usermode_loop+0x1ad/0x200 [ 51.663145] ? do_syscall_64+0x4a3/0x640 [ 51.667181] ? entry_SYSCALL_64_after_hwframe+0x5e/0xd3 [ 51.672527] ? lock_acquire+0x170/0x3f0 [ 51.676475] ? lock_downgrade+0x740/0x740 [ 51.680596] ? do_raw_spin_unlock+0x164/0x220 [ 51.685068] ? _raw_spin_unlock_irqrestore+0x66/0xe0 [ 51.690149] ? debug_check_no_obj_freed+0x2c0/0x680 [ 51.695139] ? debug_object_activate+0x490/0x490 [ 51.699870] ? debug_object_activate+0x490/0x490 [ 51.704601] ? kvfree+0x45/0x50 [ 51.707983] kfree+0xc9/0x250 [ 51.711070] kvfree+0x45/0x50 [ 51.714149] __vunmap+0x20f/0x300 [ 51.717574] vfree+0x4b/0xd0 [ 51.720569] n_tty_close+0xb2/0x1f0 [ 51.724169] ? n_tty_receive_signal_char+0x130/0x130 [ 51.729248] tty_ldisc_close+0x8c/0xc0 [ 51.733111] tty_ldisc_hangup+0x269/0x6c0 [ 51.737233] ? do_tty_hangup+0x30/0x30