Warning: Permanently added '10.128.1.74' (ED25519) to the list of known hosts.
2024/02/14 20:03:23 parsed 1 programs
[ 101.197995][ T28] kauditd_printk_skb: 36 callbacks suppressed
[ 101.198011][ T28] audit: type=1400 audit(1707941003.291:173): avc: denied { getattr } for pid=5129 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 101.228343][ T28] audit: type=1400 audit(1707941003.291:174): avc: denied { read } for pid=5129 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 101.251238][ T28] audit: type=1400 audit(1707941003.291:175): avc: denied { open } for pid=5129 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 101.275499][ T28] audit: type=1400 audit(1707941003.341:176): avc: denied { mounton } for pid=5134 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[ 101.301552][ T28] audit: type=1400 audit(1707941003.341:177): avc: denied { mount } for pid=5134 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
2024/02/14 20:03:23 executed programs: 0
[ 101.530271][ T28] audit: type=1400 audit(1707941003.621:178): avc: denied { mounton } for pid=5139 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1931 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 101.555166][ T28] audit: type=1400 audit(1707941003.631:179): avc: denied { mount } for pid=5139 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[ 101.699280][ T5139] chnl_net:caif_netlink_parms(): no params data found
[ 101.775063][ T5139] bridge0: port 1(bridge_slave_0) entered blocking state
[ 101.783487][ T5139] bridge0: port 1(bridge_slave_0) entered disabled state
[ 101.791332][ T5139] bridge_slave_0: entered allmulticast mode
[ 101.798658][ T5139] bridge_slave_0: entered promiscuous mode
[ 101.809476][ T5139] bridge0: port 2(bridge_slave_1) entered blocking state
[ 101.816794][ T5139] bridge0: port 2(bridge_slave_1) entered disabled state
[ 101.824135][ T5139] bridge_slave_1: entered allmulticast mode
[ 101.831858][ T5139] bridge_slave_1: entered promiscuous mode
[ 101.864422][ T5139] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 101.879927][ T5139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 101.915448][ T5139] team0: Port device team_slave_0 added
[ 101.924574][ T5139] team0: Port device team_slave_1 added
[ 101.955285][ T5139] batman_adv: batadv0: Adding interface: batadv_slave_0
[ 101.962263][ T5139] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 101.989414][ T5139] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[ 102.003469][ T5139] batman_adv: batadv0: Adding interface: batadv_slave_1
[ 102.010554][ T5139] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[ 102.036621][ T5139] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[ 102.076939][ T5139] hsr_slave_0: entered promiscuous mode
[ 102.083658][ T5139] hsr_slave_1: entered promiscuous mode
[ 102.248139][ T5139] netdevsim netdevsim0 netdevsim0: renamed from eth0
[ 102.249295][ T28] audit: type=1400 audit(1707941004.341:180): avc: denied { write } for pid=5139 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 102.276280][ T28] audit: type=1400 audit(1707941004.341:181): avc: denied { read } for pid=5139 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 102.281333][ T5139] netdevsim netdevsim0 netdevsim1: renamed from eth1
[ 102.310611][ T5139] netdevsim netdevsim0 netdevsim2: renamed from eth2
[ 102.322114][ T5139] netdevsim netdevsim0 netdevsim3: renamed from eth3
[ 102.355782][ T5139] bridge0: port 2(bridge_slave_1) entered blocking state
[ 102.363645][ T5139] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 102.372219][ T5139] bridge0: port 1(bridge_slave_0) entered blocking state
[ 102.379449][ T5139] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 102.454721][ T5139] 8021q: adding VLAN 0 to HW filter on device bond0
[ 102.478934][ T780] bridge0: port 1(bridge_slave_0) entered disabled state
[ 102.488136][ T780] bridge0: port 2(bridge_slave_1) entered disabled state
[ 102.506924][ T5139] 8021q: adding VLAN 0 to HW filter on device team0
[ 102.521476][ T5112] bridge0: port 1(bridge_slave_0) entered blocking state
[ 102.528687][ T5112] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 102.547115][ T9] bridge0: port 2(bridge_slave_1) entered blocking state
[ 102.554244][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 102.640755][ T5139] 8021q: adding VLAN 0 to HW filter on device batadv0
[ 102.680044][ T28] audit: type=1400 audit(1707941004.771:182): avc: denied { sys_module } for pid=5139 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 102.850971][ T5139] veth0_vlan: entered promiscuous mode
[ 102.866606][ T5139] veth1_vlan: entered promiscuous mode
[ 102.901090][ T5139] veth0_macvtap: entered promiscuous mode
[ 102.912195][ T5139] veth1_macvtap: entered promiscuous mode
[ 102.936067][ T5139] batman_adv: batadv0: Interface activated: batadv_slave_0
[ 102.952640][ T5139] batman_adv: batadv0: Interface activated: batadv_slave_1
[ 102.967431][ T5139] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 102.978097][ T5139] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 102.987403][ T5139] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 102.996465][ T5139] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 103.213292][ T5155] nbd0: detected capacity change from 0 to 2176
[ 103.912910][ T4452] block nbd0: Receive control failed (result -104)
[ 103.920880][ T5154] block nbd0: shutting down sockets
[ 103.927663][ C0] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 103.937177][ C0] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 103.945062][ T5126] ldm_validate_partition_table(): Disk read failed.
[ 103.952505][ T5126] Dev nbd0: unable to read RDB block 0
[ 103.960020][ T5126] nbd0: unable to read partition table
[ 103.966183][ T5126] nbd0: partition table beyond EOD, truncated
[ 104.103126][ T5159] nbd0: detected capacity change from 0 to 2176
[ 104.811246][ T4452] block nbd0: Receive control failed (result -104)
[ 104.811852][ T5158] block nbd0: shutting down sockets
[ 104.826679][ C1] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 104.835926][ C1] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 104.844119][ T5126] ldm_validate_partition_table(): Disk read failed.
[ 104.851449][ T5126] Dev nbd0: unable to read RDB block 0
[ 104.857488][ T5126] nbd0: unable to read partition table
[ 104.863344][ T5126] nbd0: partition table beyond EOD, truncated
[ 104.992303][ T5162] nbd0: detected capacity change from 0 to 2176
[ 105.704515][ T4452] block nbd0: Receive control failed (result -104)
[ 105.705228][ T5161] block nbd0: shutting down sockets
[ 105.717862][ C1] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 105.727204][ C1] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 105.736407][ T1051] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 105.746277][ T1051] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 105.754896][ T5126] ldm_validate_partition_table(): Disk read failed.
[ 105.761970][ T5126] Dev nbd0: unable to read RDB block 0
[ 105.767681][ T5126] nbd0: unable to read partition table
[ 105.773512][ T5126] nbd0: partition table beyond EOD, truncated
[ 105.893204][ T5165] nbd0: detected capacity change from 0 to 2176
[ 106.616739][ T4452] block nbd0: Receive control failed (result -104)
[ 136.097793][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 30 seconds
[ 166.176675][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 60 seconds
[ 167.594496][ T4509] udevd[4509]: worker [5126] /devices/virtual/block/nbd0 is taking a long time
[ 196.255526][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 90 seconds
[ 226.335582][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 120 seconds
[ 256.418936][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 150 seconds
[ 286.495633][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 180 seconds
[ 287.135557][ T29] INFO: task syz-executor.0:5164 blocked for more than 143 seconds.
[ 287.143694][ T29] Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0
[ 287.152911][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message.
[ 287.162005][ T29] task:syz-executor.0 state:D stack:29040 pid:5164 tgid:5163 ppid:5139 flags:0x00004006
[ 287.172348][ T29] Call Trace:
[ 287.176136][ T29]
[ 287.179082][ T29] __schedule+0xf12/0x5c60
[ 287.183667][ T29] ? __pfx___lock_acquire+0x10/0x10
[ 287.188995][ T29] ? __pfx___schedule+0x10/0x10
[ 287.194060][ T29] ? schedule+0x200/0x280
[ 287.198539][ T29] ? __pfx_lock_release+0x10/0x10
[ 287.203767][ T29] ? __mutex_lock+0x5b8/0x9d0
[ 287.208784][ T29] ? __mutex_trylock_common+0x78/0x250
[ 287.214347][ T29] schedule+0xe9/0x280
[ 287.218605][ T29] schedule_preempt_disabled+0x13/0x30
[ 287.224186][ T29] __mutex_lock+0x5bd/0x9d0
[ 287.229227][ T29] ? bdev_release+0xcd/0xa80
[ 287.234494][ T29] ? __pfx___mutex_lock+0x10/0x10
[ 287.239648][ T29] ? do_raw_spin_unlock+0x173/0x230
[ 287.244979][ T29] ? bdev_release+0xcd/0xa80
[ 287.249636][ T29] bdev_release+0xcd/0xa80
[ 287.254688][ T29] ? __pfx___might_resched+0x10/0x10
[ 287.260168][ T29] ? task_work_run+0x127/0x250
[ 287.264964][ T29] ? __pfx_blkdev_release+0x10/0x10
[ 287.270275][ T29] blkdev_release+0x37/0x50
[ 287.274811][ T29] __fput+0x270/0xb80
[ 287.279019][ T29] task_work_run+0x14f/0x250
[ 287.283772][ T29] ? __pfx_task_work_run+0x10/0x10
[ 287.288958][ T29] ? do_raw_spin_lock+0x290/0x2c0
[ 287.294664][ T29] get_signal+0x1073/0x2790
[ 287.299686][ T29] ? do_raw_spin_unlock+0x1d8/0x230
[ 287.304945][ T29] ? __pfx_get_signal+0x10/0x10
[ 287.310101][ T29] ? _raw_spin_unlock_irqrestore+0x52/0x80
[ 287.316309][ T29] arch_do_signal_or_restart+0x90/0x7f0
[ 287.321975][ T29] ? __pfx_arch_do_signal_or_restart+0x10/0x10
[ 287.328336][ T29] syscall_exit_to_user_mode+0x156/0x2b0
[ 287.334243][ T29] do_syscall_64+0xe5/0x270
[ 287.339235][ T29] entry_SYSCALL_64_after_hwframe+0x6f/0x77
[ 287.345576][ T29] RIP: 0033:0x4546c9
[ 287.349672][ T29] RSP: 002b:00007f0baef940f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[ 287.358418][ T29] RAX: 0000000000000000 RBX: 00000000ffffffff RCX: 00000000004546c9
[ 287.366464][ T29] RDX: 0000000000000000 RSI: 000000000000ab03 RDI: 0000000000000003
[ 287.374640][ T29] RBP: 0000000000000409 R08: 0000000000000000 R09: 0000000000000000
[ 287.382656][ T29] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004e3e00
[ 287.390683][ T29] R13: 00007f0baef94674 R14: 000000000054bf00 R15: 00000000004f4040
[ 287.399734][ T29]
[ 287.402875][ T29]
[ 287.402875][ T29] Showing all locks held in the system:
[ 287.410750][ T29] 1 lock held by khungtaskd/29:
[ 287.415678][ T29] #0: ffffffff8d7ad160 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340
[ 287.425684][ T29] 2 locks held by getty/4813:
[ 287.430377][ T29] #0: ffff88802a90b0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80
[ 287.440524][ T29] #1: ffffc900015d02f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfca/0x1490
[ 287.450782][ T29] 1 lock held by udevd/5126:
[ 287.455791][ T29] #0: ffff8880206a44c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open_by_dev+0x276/0xec0
[ 287.466119][ T29] 1 lock held by syz-executor.0/5164:
[ 287.471588][ T29] #0: ffff8880206a44c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0xcd/0xa80
[ 287.481426][ T29]
[ 287.483762][ T29] =============================================
[ 287.483762][ T29]
[ 287.492216][ T29] NMI backtrace for cpu 0
[ 287.496637][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0
[ 287.506026][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 287.517776][ T29] Call Trace:
[ 287.521073][ T29]
[ 287.524199][ T29] dump_stack_lvl+0xd9/0x1b0
[ 287.529076][ T29] nmi_cpu_backtrace+0x27b/0x390
[ 287.534073][ T29] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10
[ 287.540170][ T29] nmi_trigger_cpumask_backtrace+0x29c/0x300
[ 287.546603][ T29] watchdog+0xf87/0x1210
[ 287.550929][ T29] ? __pfx_watchdog+0x10/0x10
[ 287.555619][ T29] ? lockdep_hardirqs_on+0x7d/0x110
[ 287.561447][ T29] ? __kthread_parkme+0x14b/0x220
[ 287.566841][ T29] ? __pfx_watchdog+0x10/0x10
[ 287.571715][ T29] kthread+0x2c6/0x3b0
[ 287.576142][ T29] ? _raw_spin_unlock_irq+0x23/0x50
[ 287.581447][ T29] ? __pfx_kthread+0x10/0x10
[ 287.586147][ T29] ret_from_fork+0x45/0x80
[ 287.590909][ T29] ? __pfx_kthread+0x10/0x10
[ 287.595727][ T29] ret_from_fork_asm+0x1b/0x30
[ 287.609898][ T29]
[ 287.613397][ T29] Sending NMI from CPU 0 to CPUs 1:
[ 287.618732][ C1] NMI backtrace for cpu 1
[ 287.618742][ C1] CPU: 1 PID: 4498 Comm: klogd Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0
[ 287.618765][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 287.618777][ C1] RIP: 0010:__sanitizer_cov_trace_switch+0x40/0x90
[ 287.618817][ C1] Code: 48 83 f8 20 74 6b 77 48 48 83 f8 08 74 5b 48 83 f8 10 75 2f 41 bd 03 00 00 00 4c 8b 75 00 31 db 4d 85 f6 74 1e 48 8b 74 dd 10 <4c> 89 e2 4c 89 ef 48 83 c3 01 48 8b 4c 24 28 e8 8c fd ff ff 49 39
[ 287.618837][ C1] RSP: 0018:ffffc90003477898 EFLAGS: 00000202
[ 287.618854][ C1] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffffffff8ab6756a
[ 287.618868][ C1] RDX: ffff88807eba8000 RSI: 0000000000000011 RDI: 0000000000000001
[ 287.618882][ C1] RBP: ffffffff8c5c02a0 R08: 0000000000000001 R09: 0000000000000010
[ 287.618895][ C1] R10: 000000000000000f R11: fffffffffffe3968 R12: 000000000000000f
[ 287.618909][ C1] R13: 0000000000000001 R14: 000000000000000a R15: 000000000000000f
[ 287.618922][ C1] FS: 00007f515f5c7380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
[ 287.618945][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 287.618967][ C1] CR2: 000055f7b9a9b680 CR3: 000000002fab0000 CR4: 00000000003506f0
[ 287.618981][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 287.618994][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 287.619008][ C1] Call Trace:
[ 287.619014][ C1]
[ 287.619021][ C1] ? show_regs+0x8f/0xa0
[ 287.619055][ C1] ? nmi_cpu_backtrace+0x1d8/0x390
[ 287.619084][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20
[ 287.619115][ C1] ? nmi_handle+0x1a9/0x580
[ 287.619135][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90
[ 287.619167][ C1] ? default_do_nmi+0x6a/0x160
[ 287.619195][ C1] ? exc_nmi+0x18a/0x210
[ 287.619221][ C1] ? end_repeat_nmi+0xf/0x60
[ 287.619313][ C1] ? vsnprintf+0x7ba/0x1870
[ 287.619372][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90
[ 287.619404][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90
[ 287.619437][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90
[ 287.619469][ C1]
[ 287.619475][ C1]
[ 287.619481][ C1] vsnprintf+0x7ba/0x1870
[ 287.619514][ C1] ? __pfx_vsnprintf+0x10/0x10
[ 287.619545][ C1] ? __pfx_vsnprintf+0x10/0x10
[ 287.619579][ C1] snprintf+0xc8/0x100
[ 287.619609][ C1] ? __pfx_snprintf+0x10/0x10
[ 287.619640][ C1] ? __pfx_sprintf+0x10/0x10
[ 287.619672][ C1] ? get_data+0x39b/0x550
[ 287.619724][ C1] info_print_prefix+0x135/0x350
[ 287.619774][ C1] ? __pfx_info_print_prefix+0x10/0x10
[ 287.619804][ C1] ? __pfx__prb_read_valid+0x10/0x10
[ 287.619829][ C1] record_print_text+0x143/0x410
[ 287.619858][ C1] ? __pfx_lock_release+0x10/0x10
[ 287.619887][ C1] ? __pfx_record_print_text+0x10/0x10
[ 287.619916][ C1] ? __pfx_prb_read_valid+0x10/0x10
[ 287.619943][ C1] syslog_print+0x4e9/0x5d0
[ 287.619977][ C1] ? __pfx_syslog_print+0x10/0x10
[ 287.620005][ C1] ? avc_has_perm_noaudit+0x145/0x3a0
[ 287.620107][ C1] ? __pfx_autoremove_wake_function+0x10/0x10
[ 287.620163][ C1] ? __pfx_avc_has_perm+0x10/0x10
[ 287.620191][ C1] ? selinux_syslog+0xf2/0x2e0
[ 287.620255][ C1] ? security_syslog+0x8e/0xb0
[ 287.620333][ C1] do_syslog+0x2d8/0x580
[ 287.620366][ C1] ? __pfx_do_syslog+0x10/0x10
[ 287.620403][ C1] __x64_sys_syslog+0x74/0xb0
[ 287.620436][ C1] ? lockdep_hardirqs_on+0x7d/0x110
[ 287.620469][ C1] do_syscall_64+0xd5/0x270
[ 287.620491][ C1] entry_SYSCALL_64_after_hwframe+0x6f/0x77
[ 287.620525][ C1] RIP: 0033:0x7f515f728fa7
[ 287.620541][ C1] Code: 73 01 c3 48 8b 0d 81 ce 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 67 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 ce 0c 00 f7 d8 64 89 01 48
[ 287.620561][ C1] RSP: 002b:00007ffea3471978 EFLAGS: 00000206 ORIG_RAX: 0000000000000067
[ 287.620581][ C1] RAX: ffffffffffffffda RBX: 00007f515f8c74a0 RCX: 00007f515f728fa7
[ 287.620595][ C1] RDX: 00000000000003ff RSI: 00007f515f8c74a0 RDI: 0000000000000002
[ 287.620609][ C1] RBP: 0000000000000000 R08: 0000000000000007 R09: 277d4c939d8b5048
[ 287.620622][ C1] R10: 0000000000004000 R11: 0000000000000206 R12: 00007f515f8c74a0
[ 287.620636][ C1] R13: 00007f515f8b7212 R14: 00007f515f8c7535 R15: 00007f515f8c7535
[ 287.620654][ C1]
[ 287.620735][ T29] Kernel panic - not syncing: hung_task: blocked tasks
[ 288.050484][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0
[ 288.059795][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
[ 288.070153][ T29] Call Trace:
[ 288.073437][ T29]
[ 288.076373][ T29] dump_stack_lvl+0xd9/0x1b0
[ 288.080984][ T29] panic+0x6ee/0x7a0
[ 288.085056][ T29] ? __pfx_panic+0x10/0x10
[ 288.089746][ T29] ? preempt_schedule_thunk+0x1a/0x30
[ 288.095307][ T29] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10
[ 288.101472][ T29] ? preempt_schedule_thunk+0x1a/0x30
[ 288.106950][ T29] ? watchdog+0xd3e/0x1210
[ 288.111393][ T29] ? watchdog+0xd31/0x1210
[ 288.115994][ T29] watchdog+0xd4f/0x1210
[ 288.120535][ T29] ? __pfx_watchdog+0x10/0x10
[ 288.125230][ T29] ? lockdep_hardirqs_on+0x7d/0x110
[ 288.130443][ T29] ? __kthread_parkme+0x14b/0x220
[ 288.135649][ T29] ? __pfx_watchdog+0x10/0x10
[ 288.140422][ T29] kthread+0x2c6/0x3b0
[ 288.144507][ T29] ? _raw_spin_unlock_irq+0x23/0x50
[ 288.149716][ T29] ? __pfx_kthread+0x10/0x10
[ 288.154316][ T29] ret_from_fork+0x45/0x80
[ 288.158748][ T29] ? __pfx_kthread+0x10/0x10
[ 288.163607][ T29] ret_from_fork_asm+0x1b/0x30
[ 288.168567][ T29]
[ 288.171855][ T29] Kernel Offset: disabled
[ 288.176269][ T29] Rebooting in 86400 seconds..