[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 19.168762] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.814917] random: sshd: uninitialized urandom read (32 bytes read) [ 23.239123] random: sshd: uninitialized urandom read (32 bytes read) [ 23.999766] random: sshd: uninitialized urandom read (32 bytes read) [ 669.507992] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.9' (ECDSA) to the list of known hosts. [ 674.964213] random: sshd: uninitialized urandom read (32 bytes read) [ 675.074144] IPVS: ftp: loaded support on port[0] = 21 [ 675.075496] IPVS: ftp: loaded support on port[0] = 21 [ 675.079469] IPVS: ftp: loaded support on port[0] = 21 [ 675.086691] IPVS: ftp: loaded support on port[0] = 21 [ 675.090683] IPVS: ftp: loaded support on port[0] = 21 [ 675.097819] IPVS: ftp: loaded support on port[0] = 21 [ 675.100599] IPVS: ftp: loaded support on port[0] = 21 [ 675.112306] IPVS: ftp: loaded support on port[0] = 21 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 1009.013051] INFO: task syz-executor694:4903 blocked for more than 120 seconds. [ 1009.020646] Not tainted 4.17.0-rc6+ #63 [ 1009.025176] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1009.033162] syz-executor694 D24936 4903 4506 0x00000004 [ 1009.038894] Call Trace: [ 1009.041646] __schedule+0x801/0x1e30 [ 1009.045407] ? __sched_text_start+0x8/0x8 [ 1009.049692] ? __lock_acquire+0x7f5/0x5140 [ 1009.053978] ? graph_lock+0x170/0x170 [ 1009.057805] ? graph_lock+0x170/0x170 [ 1009.061649] ? __lock_acquire+0x7f5/0x5140 [ 1009.065909] ? debug_check_no_locks_freed+0x310/0x310 [ 1009.071132] ? print_usage_bug+0xc0/0xc0 [ 1009.075226] schedule+0xef/0x430 [ 1009.078626] ? lock_downgrade+0x8e0/0x8e0 [ 1009.082800] ? __schedule+0x1e30/0x1e30 [ 1009.086814] ? mark_held_locks+0xc9/0x160 [ 1009.090984] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1009.095619] ? _raw_spin_unlock_irq+0x27/0x70 [ 1009.100226] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1009.105616] __rwsem_down_write_failed_common+0x919/0x15d0 [ 1009.111267] ? rwsem_spin_on_owner+0xa40/0xa40 [ 1009.115915] ? is_bpf_text_address+0xd7/0x170 [ 1009.120457] ? kernel_text_address+0x79/0xf0 [ 1009.124936] ? __unwind_start+0x166/0x330 [ 1009.129111] ? debug_check_no_locks_freed+0x310/0x310 [ 1009.134386] ? save_stack+0xa9/0xd0 [ 1009.138047] ? save_stack+0x43/0xd0 [ 1009.141694] ? __kasan_slab_free+0x11a/0x170 [ 1009.146125] ? kasan_slab_free+0xe/0x10 [ 1009.150118] ? kmem_cache_free+0x86/0x2d0 [ 1009.154336] ? putname+0xf2/0x130 [ 1009.157811] ? filename_lookup+0x38b/0x4f0 [ 1009.162065] ? kern_path+0x33/0x40 [ 1009.165633] ? do_mount+0xe35/0x3070 [ 1009.169368] ? ksys_mount+0x12d/0x140 [ 1009.173226] ? do_syscall_64+0x1b1/0x800 [ 1009.177312] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.182713] ? kasan_check_read+0x11/0x20 [ 1009.186885] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1009.191316] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1009.195920] ? kasan_check_write+0x14/0x20 [ 1009.200178] ? do_raw_spin_lock+0xc1/0x200 [ 1009.204434] ? trace_hardirqs_off+0xd/0x10 [ 1009.208691] ? _raw_spin_unlock_irqrestore+0x63/0xc0 [ 1009.213816] ? graph_lock+0x170/0x170 [ 1009.217674] ? rcu_is_watching+0x85/0x140 [ 1009.221845] ? rcu_pm_notify+0xc0/0xc0 [ 1009.225751] ? trace_hardirqs_off+0xd/0x10 [ 1009.230039] ? lock_acquire+0x1dc/0x520 [ 1009.234086] ? check_same_owner+0x320/0x320 [ 1009.238437] rwsem_down_write_failed+0xe/0x10 [ 1009.242957] ? rwsem_down_write_failed+0xe/0x10 [ 1009.247648] call_rwsem_down_write_failed+0x17/0x30 [ 1009.252690] down_write+0xa2/0x120 [ 1009.256248] ? lock_mount+0xdc/0x2e0 [ 1009.259982] ? down_read+0x1b0/0x1b0 [ 1009.263723] ? memcpy+0x45/0x50 [ 1009.267059] lock_mount+0xdc/0x2e0 [ 1009.270622] do_mount+0xebc/0x3070 [ 1009.274181] ? copy_mount_string+0x40/0x40 [ 1009.278432] ? rcu_pm_notify+0xc0/0xc0 [ 1009.282343] ? copy_mount_options+0x5f/0x380 [ 1009.286767] ? kmem_cache_alloc_trace+0x616/0x780 [ 1009.291687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1009.297308] ? _copy_from_user+0xdf/0x150 [ 1009.301478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1009.307042] ? copy_mount_options+0x285/0x380 [ 1009.311558] ksys_mount+0x12d/0x140 [ 1009.315204] __x64_sys_mount+0xbe/0x150 [ 1009.319194] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1009.324228] do_syscall_64+0x1b1/0x800 [ 1009.328130] ? finish_task_switch+0x1ca/0x840 [ 1009.332644] ? syscall_return_slowpath+0x5c0/0x5c0 [ 1009.337592] ? syscall_return_slowpath+0x30f/0x5c0 [ 1009.342546] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1009.347929] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1009.352795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1009.357998] RIP: 0033:0x447099 [ 1009.361203] RSP: 002b:00007f0d700b4da8 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1009.368931] RAX: ffffffffffffffda RBX: 00000000006ddcb4 RCX: 0000000000447099 [ 1009.376218] RDX: 0000000020000140 RSI: 00000000200000c0 RDI: 0000000020000000 [ 1009.383499] RBP: 00000000006ddcb0 R08: 0000000020000200 R09: 0000000000000000 [ 1009.390790] R10: 0000000000003080 R11: 0000000000000246 R12: 0030656c69662f2e [ 1009.398075] R13: 6f7365725f736e64 R14: 70756f7267632f2e R15: 0000000000000007 [ 1009.405374] [ 1009.405374] Showing all locks held in the system: [ 1009.411739] 2 locks held by khungtaskd/892: [ 1009.416175] #0: (ptrval) (rcu_read_lock){....}, at: watchdog+0x1ff/0xf60 [ 1009.423869] #1: (ptrval) (tasklist_lock){.+.+}, at: debug_show_all_locks+0xde/0x34a [ 1009.432550] 1 lock held by rsyslogd/4380: [ 1009.436724] #0: (ptrval) (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1a9/0x1e0 [ 1009.444751] 2 locks held by getty/4470: [ 1009.448749] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.457028] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.466053] 2 locks held by getty/4471: [ 1009.470035] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.478324] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.487212] 2 locks held by getty/4472: [ 1009.491207] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.499482] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.508388] 2 locks held by getty/4473: [ 1009.512373] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.520656] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.529549] 2 locks held by getty/4474: [ 1009.533547] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.541825] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.550727] 2 locks held by getty/4475: [ 1009.554706] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.562976] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.571886] 2 locks held by getty/4476: [ 1009.575867] #0: (ptrval) (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x37/0x40 [ 1009.584135] #1: (ptrval) (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x321/0x1cc0 [ 1009.593040] 2 locks held by syz-executor694/4903: [ 1009.597888] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.606880] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.614640] 2 locks held by syz-executor694/4901: [ 1009.619510] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.628481] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.636253] 2 locks held by syz-executor694/4905: [ 1009.641100] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.650083] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.657841] 2 locks held by syz-executor694/4911: [ 1009.662701] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.671679] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.679451] 2 locks held by syz-executor694/4913: [ 1009.684302] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.693286] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.701047] 2 locks held by syz-executor694/4919: [ 1009.705912] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.714892] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.722666] 2 locks held by syz-executor694/4921: [ 1009.727519] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.736491] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.744243] 2 locks held by syz-executor694/4928: [ 1009.749090] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.758060] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.765815] 2 locks held by syz-executor694/4935: [ 1009.770664] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.780097] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.787862] 2 locks held by syz-executor694/4937: [ 1009.792728] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.801720] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.809499] 2 locks held by syz-executor694/4939: [ 1009.814350] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.823336] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.831104] 2 locks held by syz-executor694/4941: [ 1009.835967] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.844963] #1: (ptrval) (namespace_sem){++++}, at: lock_mount+0xdc/0x2e0 [ 1009.852758] 1 lock held by syz-executor694/4943: [ 1009.857534] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lookup_slow+0x49/0x80 [ 1009.866521] 2 locks held by syz-executor694/4944: [ 1009.871382] #0: (ptrval) (sb_writers#12){.+.+}, at: mnt_want_write+0x3f/0xc0 [ 1009.879406] #1: (ptrval) (&sb->s_type->i_mutex_key#15/1){+.+.}, at: filename_create+0x1aa/0x5a0 [ 1009.889105] 1 lock held by syz-executor694/4945: [ 1009.893877] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.902869] 1 lock held by syz-executor694/4947: [ 1009.907635] #0: (ptrval) (&sb->s_type->i_mutex_key#15){++++}, at: lock_mount+0x8c/0x2e0 [ 1009.916623] [ 1009.918268] ============================================= [ 1009.918268] [ 1009.925316] NMI backtrace for cpu 0 [ 1009.928963] CPU: 0 PID: 892 Comm: khungtaskd Not tainted 4.17.0-rc6+ #63 [ 1009.935791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1009.945134] Call Trace: [ 1009.947790] dump_stack+0x1b9/0x294 [ 1009.951423] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1009.956619] nmi_cpu_backtrace.cold.4+0x19/0xce [ 1009.961342] ? lapic_can_unplug_cpu.cold.26+0x3f/0x3f [ 1009.966531] nmi_trigger_cpumask_backtrace+0x151/0x192 [ 1009.971808] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1009.976997] watchdog+0xc10/0xf60 [ 1009.980461] ? reset_hung_task_detector+0xb0/0xb0 [ 1009.985308] ? __schedule+0x1e30/0x1e30 [ 1009.989284] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1009.993692] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1009.998275] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.003811] ? __kthread_parkme+0x111/0x1d0 [ 1010.008133] ? parse_args.cold.15+0x1b3/0x1b3 [ 1010.012629] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1010.017642] ? trace_hardirqs_on+0xd/0x10 [ 1010.021789] kthread+0x345/0x410 [ 1010.025154] ? reset_hung_task_detector+0xb0/0xb0 [ 1010.029992] ? kthread_bind+0x40/0x40 [ 1010.033790] ret_from_fork+0x3a/0x50 [ 1010.037538] Sending NMI from CPU 0 to CPUs 1: [ 1010.042052] NMI backtrace for cpu 1 [ 1010.042063] CPU: 1 PID: 4901 Comm: syz-executor694 Not tainted 4.17.0-rc6+ #63 [ 1010.042067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.042079] RIP: 0010:lock_release+0x1f5/0xa10 [ 1010.042084] RSP: 0018:ffff8801afca7708 EFLAGS: 00000097 [ 1010.042091] RAX: 0000000000000003 RBX: 1ffff10035f94ee6 RCX: ffffffff815e1551 [ 1010.042096] RDX: 0000000000000004 RSI: 0000000000000001 RDI: 0000000000000001 [ 1010.042101] RBP: ffff8801afca7838 R08: 0000000000000000 R09: ffffed00351966c8 [ 1010.042106] R10: ffffed00351966c8 R11: ffff8801a8cb3643 R12: ffff8801afca7810 [ 1010.042112] R13: ffff8801a8cb3658 R14: ffff8801a9a003c0 R15: ffff8801afca7750 [ 1010.042119] FS: 00007f0d700f7700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 1010.042124] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1010.042129] CR2: ffffffffff600400 CR3: 00000001d05cc000 CR4: 00000000001406e0 [ 1010.042137] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1010.042142] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1010.042144] Call Trace: [ 1010.042153] ? lock_acquire+0x1dc/0x520 [ 1010.042229] ? lockref_get+0x42/0x50 [ 1010.042238] ? lock_downgrade+0x8e0/0x8e0 [ 1010.042246] ? lock_release+0xa10/0xa10 [ 1010.042258] ? kasan_check_read+0x11/0x20 [ 1010.042268] ? rcu_is_watching+0x85/0x140 [ 1010.042277] ? kasan_check_write+0x14/0x20 [ 1010.042286] ? do_raw_spin_lock+0xc1/0x200 [ 1010.042296] _raw_spin_unlock+0x1a/0x30 [ 1010.042305] lockref_get+0x42/0x50 [ 1010.042315] mnt_set_mountpoint+0xe7/0x360 [ 1010.042323] ? __is_local_mountpoint+0x200/0x200 [ 1010.042355] ? propagate_mnt+0x196/0x3e0 [ 1010.042364] ? propagate_one+0x67/0x910 [ 1010.042372] propagate_one+0x5a7/0x910 [ 1010.042381] ? next_group+0x3f0/0x3f0 [ 1010.042391] propagate_mnt+0x18a/0x3e0 [ 1010.042401] attach_recursive_mnt+0x5f8/0xb50 [ 1010.042410] ? count_mounts+0x350/0x350 [ 1010.042418] ? rcu_read_lock_sched_held+0x108/0x120 [ 1010.042426] ? kfree+0x1e9/0x260 [ 1010.042434] ? get_mountpoint+0xde/0x400 [ 1010.042441] ? namespace_unlock+0x1f0/0x1f0 [ 1010.042451] ? down_read+0x1b0/0x1b0 [ 1010.042460] ? _raw_spin_unlock+0x22/0x30 [ 1010.042469] graft_tree+0x1aa/0x240 [ 1010.042477] do_add_mount+0x1fe/0x370 [ 1010.042486] do_mount+0x18e6/0x3070 [ 1010.042494] ? interrupt_entry+0xb1/0xf0 [ 1010.042502] ? copy_mount_string+0x40/0x40 [ 1010.042513] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1010.042526] ? retint_kernel+0x10/0x10 [ 1010.042535] ? copy_mount_options+0x1e3/0x380 [ 1010.042545] ? write_comp_data+0x22/0x70 [ 1010.042556] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1010.042564] ? copy_mount_options+0x285/0x380 [ 1010.042573] ksys_mount+0x12d/0x140 [ 1010.042581] __x64_sys_mount+0xbe/0x150 [ 1010.042590] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1010.042599] do_syscall_64+0x1b1/0x800 [ 1010.042609] ? finish_task_switch+0x1ca/0x840 [ 1010.042618] ? syscall_return_slowpath+0x5c0/0x5c0 [ 1010.042627] ? syscall_return_slowpath+0x30f/0x5c0 [ 1010.042637] ? entry_SYSCALL_64_after_hwframe+0x59/0xbe [ 1010.042647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1010.042656] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1010.042662] RIP: 0033:0x447099 [ 1010.042666] RSP: 002b:00007f0d700f6da8 EFLAGS: 00000293 ORIG_RAX: 00000000000000a5 [ 1010.042674] RAX: ffffffffffffffda RBX: 00000000006ddc84 RCX: 0000000000447099 [ 1010.042679] RDX: 00000000200001c0 RSI: 0000000020026ff8 RDI: 000000002000a000 [ 1010.042684] RBP: 00000000006ddc80 R08: 00000000200007c0 R09: 0000000000000000 [ 1010.042689] R10: 0000000000000080 R11: 0000000000000293 R12: 0030656c69662f2e [ 1010.042694] R13: 6f7365725f736e64 R14: 70756f7267632f2e R15: 0000000000000007 [ 1010.042698] Code: c1 ea 03 0f b6 14 02 48 89 f8 83 e0 07 83 c0 03 65 4c 8b 34 25 40 ee 01 00 38 d0 7c 08 84 d2 0f 85 67 06 00 00 8b 3d fb bd ac 07 <85> ff 0f 84 41 02 00 00 49 8d 86 30 08 00 00 48 89 c2 48 89 85 [ 1010.043056] Kernel panic - not syncing: hung_task: blocked tasks [ 1010.413758] CPU: 0 PID: 892 Comm: khungtaskd Not tainted 4.17.0-rc6+ #63 [ 1010.420588] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1010.429931] Call Trace: [ 1010.432519] dump_stack+0x1b9/0x294 [ 1010.436151] ? dump_stack_print_info.cold.2+0x52/0x52 [ 1010.441413] ? printk_safe_log_store+0x260/0x260 [ 1010.446225] panic+0x22f/0x4de [ 1010.449413] ? add_taint.cold.5+0x16/0x16 [ 1010.453564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1010.459104] ? nmi_trigger_cpumask_backtrace+0x13a/0x192 [ 1010.464556] ? printk_safe_flush+0xd7/0x130 [ 1010.468881] watchdog+0xc21/0xf60 [ 1010.472337] ? reset_hung_task_detector+0xb0/0xb0 [ 1010.477182] ? __schedule+0x1e30/0x1e30 [ 1010.481155] ? do_raw_spin_unlock+0x9e/0x2e0 [ 1010.485564] ? do_raw_spin_trylock+0x1b0/0x1b0 [ 1010.490146] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1010.495684] ? __kthread_parkme+0x111/0x1d0 [ 1010.500003] ? parse_args.cold.15+0x1b3/0x1b3 [ 1010.504493] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 1010.509505] ? trace_hardirqs_on+0xd/0x10 [ 1010.513655] kthread+0x345/0x410 [ 1010.517016] ? reset_hung_task_detector+0xb0/0xb0 [ 1010.521852] ? kthread_bind+0x40/0x40 [ 1010.525655] ret_from_fork+0x3a/0x50 [ 1010.530165] Dumping ftrace buffer: [ 1010.533780] (ftrace buffer empty) [ 1010.537467] Kernel Offset: disabled [ 1010.541072] Rebooting in 86400 seconds..