Warning: Permanently added '10.128.1.74' (ED25519) to the list of known hosts. 2024/02/14 20:03:23 parsed 1 programs [ 101.197995][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 101.198011][ T28] audit: type=1400 audit(1707941003.291:173): avc: denied { getattr } for pid=5129 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 101.228343][ T28] audit: type=1400 audit(1707941003.291:174): avc: denied { read } for pid=5129 comm="syz-execprog" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 101.251238][ T28] audit: type=1400 audit(1707941003.291:175): avc: denied { open } for pid=5129 comm="syz-execprog" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 101.275499][ T28] audit: type=1400 audit(1707941003.341:176): avc: denied { mounton } for pid=5134 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 101.301552][ T28] audit: type=1400 audit(1707941003.341:177): avc: denied { mount } for pid=5134 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 2024/02/14 20:03:23 executed programs: 0 [ 101.530271][ T28] audit: type=1400 audit(1707941003.621:178): avc: denied { mounton } for pid=5139 comm="syz-executor.0" path="/syzcgroup/unified" dev="sda1" ino=1931 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 101.555166][ T28] audit: type=1400 audit(1707941003.631:179): avc: denied { mount } for pid=5139 comm="syz-executor.0" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 101.699280][ T5139] chnl_net:caif_netlink_parms(): no params data found [ 101.775063][ T5139] bridge0: port 1(bridge_slave_0) entered blocking state [ 101.783487][ T5139] bridge0: port 1(bridge_slave_0) entered disabled state [ 101.791332][ T5139] bridge_slave_0: entered allmulticast mode [ 101.798658][ T5139] bridge_slave_0: entered promiscuous mode [ 101.809476][ T5139] bridge0: port 2(bridge_slave_1) entered blocking state [ 101.816794][ T5139] bridge0: port 2(bridge_slave_1) entered disabled state [ 101.824135][ T5139] bridge_slave_1: entered allmulticast mode [ 101.831858][ T5139] bridge_slave_1: entered promiscuous mode [ 101.864422][ T5139] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 101.879927][ T5139] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 101.915448][ T5139] team0: Port device team_slave_0 added [ 101.924574][ T5139] team0: Port device team_slave_1 added [ 101.955285][ T5139] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 101.962263][ T5139] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 101.989414][ T5139] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 102.003469][ T5139] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 102.010554][ T5139] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 102.036621][ T5139] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 102.076939][ T5139] hsr_slave_0: entered promiscuous mode [ 102.083658][ T5139] hsr_slave_1: entered promiscuous mode [ 102.248139][ T5139] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 102.249295][ T28] audit: type=1400 audit(1707941004.341:180): avc: denied { write } for pid=5139 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.276280][ T28] audit: type=1400 audit(1707941004.341:181): avc: denied { read } for pid=5139 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.281333][ T5139] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 102.310611][ T5139] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 102.322114][ T5139] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 102.355782][ T5139] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.363645][ T5139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.372219][ T5139] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.379449][ T5139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.454721][ T5139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 102.478934][ T780] bridge0: port 1(bridge_slave_0) entered disabled state [ 102.488136][ T780] bridge0: port 2(bridge_slave_1) entered disabled state [ 102.506924][ T5139] 8021q: adding VLAN 0 to HW filter on device team0 [ 102.521476][ T5112] bridge0: port 1(bridge_slave_0) entered blocking state [ 102.528687][ T5112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 102.547115][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 102.554244][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 102.640755][ T5139] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 102.680044][ T28] audit: type=1400 audit(1707941004.771:182): avc: denied { sys_module } for pid=5139 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 102.850971][ T5139] veth0_vlan: entered promiscuous mode [ 102.866606][ T5139] veth1_vlan: entered promiscuous mode [ 102.901090][ T5139] veth0_macvtap: entered promiscuous mode [ 102.912195][ T5139] veth1_macvtap: entered promiscuous mode [ 102.936067][ T5139] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 102.952640][ T5139] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 102.967431][ T5139] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.978097][ T5139] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.987403][ T5139] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 102.996465][ T5139] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 103.213292][ T5155] nbd0: detected capacity change from 0 to 2176 [ 103.912910][ T4452] block nbd0: Receive control failed (result -104) [ 103.920880][ T5154] block nbd0: shutting down sockets [ 103.927663][ C0] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 103.937177][ C0] Buffer I/O error on dev nbd0, logical block 0, async page read [ 103.945062][ T5126] ldm_validate_partition_table(): Disk read failed. [ 103.952505][ T5126] Dev nbd0: unable to read RDB block 0 [ 103.960020][ T5126] nbd0: unable to read partition table [ 103.966183][ T5126] nbd0: partition table beyond EOD, truncated [ 104.103126][ T5159] nbd0: detected capacity change from 0 to 2176 [ 104.811246][ T4452] block nbd0: Receive control failed (result -104) [ 104.811852][ T5158] block nbd0: shutting down sockets [ 104.826679][ C1] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 104.835926][ C1] Buffer I/O error on dev nbd0, logical block 0, async page read [ 104.844119][ T5126] ldm_validate_partition_table(): Disk read failed. [ 104.851449][ T5126] Dev nbd0: unable to read RDB block 0 [ 104.857488][ T5126] nbd0: unable to read partition table [ 104.863344][ T5126] nbd0: partition table beyond EOD, truncated [ 104.992303][ T5162] nbd0: detected capacity change from 0 to 2176 [ 105.704515][ T4452] block nbd0: Receive control failed (result -104) [ 105.705228][ T5161] block nbd0: shutting down sockets [ 105.717862][ C1] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 105.727204][ C1] Buffer I/O error on dev nbd0, logical block 0, async page read [ 105.736407][ T1051] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 105.746277][ T1051] Buffer I/O error on dev nbd0, logical block 0, async page read [ 105.754896][ T5126] ldm_validate_partition_table(): Disk read failed. [ 105.761970][ T5126] Dev nbd0: unable to read RDB block 0 [ 105.767681][ T5126] nbd0: unable to read partition table [ 105.773512][ T5126] nbd0: partition table beyond EOD, truncated [ 105.893204][ T5165] nbd0: detected capacity change from 0 to 2176 [ 106.616739][ T4452] block nbd0: Receive control failed (result -104) [ 136.097793][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 30 seconds [ 166.176675][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 60 seconds [ 167.594496][ T4509] udevd[4509]: worker [5126] /devices/virtual/block/nbd0 is taking a long time [ 196.255526][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 90 seconds [ 226.335582][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 120 seconds [ 256.418936][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 150 seconds [ 286.495633][ T1051] block nbd0: Possible stuck request ffff888020c10800: control (read@0,4096B). Runtime 180 seconds [ 287.135557][ T29] INFO: task syz-executor.0:5164 blocked for more than 143 seconds. [ 287.143694][ T29] Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0 [ 287.152911][ T29] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 287.162005][ T29] task:syz-executor.0 state:D stack:29040 pid:5164 tgid:5163 ppid:5139 flags:0x00004006 [ 287.172348][ T29] Call Trace: [ 287.176136][ T29] [ 287.179082][ T29] __schedule+0xf12/0x5c60 [ 287.183667][ T29] ? __pfx___lock_acquire+0x10/0x10 [ 287.188995][ T29] ? __pfx___schedule+0x10/0x10 [ 287.194060][ T29] ? schedule+0x200/0x280 [ 287.198539][ T29] ? __pfx_lock_release+0x10/0x10 [ 287.203767][ T29] ? __mutex_lock+0x5b8/0x9d0 [ 287.208784][ T29] ? __mutex_trylock_common+0x78/0x250 [ 287.214347][ T29] schedule+0xe9/0x280 [ 287.218605][ T29] schedule_preempt_disabled+0x13/0x30 [ 287.224186][ T29] __mutex_lock+0x5bd/0x9d0 [ 287.229227][ T29] ? bdev_release+0xcd/0xa80 [ 287.234494][ T29] ? __pfx___mutex_lock+0x10/0x10 [ 287.239648][ T29] ? do_raw_spin_unlock+0x173/0x230 [ 287.244979][ T29] ? bdev_release+0xcd/0xa80 [ 287.249636][ T29] bdev_release+0xcd/0xa80 [ 287.254688][ T29] ? __pfx___might_resched+0x10/0x10 [ 287.260168][ T29] ? task_work_run+0x127/0x250 [ 287.264964][ T29] ? __pfx_blkdev_release+0x10/0x10 [ 287.270275][ T29] blkdev_release+0x37/0x50 [ 287.274811][ T29] __fput+0x270/0xb80 [ 287.279019][ T29] task_work_run+0x14f/0x250 [ 287.283772][ T29] ? __pfx_task_work_run+0x10/0x10 [ 287.288958][ T29] ? do_raw_spin_lock+0x290/0x2c0 [ 287.294664][ T29] get_signal+0x1073/0x2790 [ 287.299686][ T29] ? do_raw_spin_unlock+0x1d8/0x230 [ 287.304945][ T29] ? __pfx_get_signal+0x10/0x10 [ 287.310101][ T29] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 287.316309][ T29] arch_do_signal_or_restart+0x90/0x7f0 [ 287.321975][ T29] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 287.328336][ T29] syscall_exit_to_user_mode+0x156/0x2b0 [ 287.334243][ T29] do_syscall_64+0xe5/0x270 [ 287.339235][ T29] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 287.345576][ T29] RIP: 0033:0x4546c9 [ 287.349672][ T29] RSP: 002b:00007f0baef940f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 287.358418][ T29] RAX: 0000000000000000 RBX: 00000000ffffffff RCX: 00000000004546c9 [ 287.366464][ T29] RDX: 0000000000000000 RSI: 000000000000ab03 RDI: 0000000000000003 [ 287.374640][ T29] RBP: 0000000000000409 R08: 0000000000000000 R09: 0000000000000000 [ 287.382656][ T29] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004e3e00 [ 287.390683][ T29] R13: 00007f0baef94674 R14: 000000000054bf00 R15: 00000000004f4040 [ 287.399734][ T29] [ 287.402875][ T29] [ 287.402875][ T29] Showing all locks held in the system: [ 287.410750][ T29] 1 lock held by khungtaskd/29: [ 287.415678][ T29] #0: ffffffff8d7ad160 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x75/0x340 [ 287.425684][ T29] 2 locks held by getty/4813: [ 287.430377][ T29] #0: ffff88802a90b0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 287.440524][ T29] #1: ffffc900015d02f0 (&ldata->atomic_read_lock){+.+.}-{3:3}, at: n_tty_read+0xfca/0x1490 [ 287.450782][ T29] 1 lock held by udevd/5126: [ 287.455791][ T29] #0: ffff8880206a44c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_open_by_dev+0x276/0xec0 [ 287.466119][ T29] 1 lock held by syz-executor.0/5164: [ 287.471588][ T29] #0: ffff8880206a44c8 (&disk->open_mutex){+.+.}-{3:3}, at: bdev_release+0xcd/0xa80 [ 287.481426][ T29] [ 287.483762][ T29] ============================================= [ 287.483762][ T29] [ 287.492216][ T29] NMI backtrace for cpu 0 [ 287.496637][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0 [ 287.506026][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 287.517776][ T29] Call Trace: [ 287.521073][ T29] [ 287.524199][ T29] dump_stack_lvl+0xd9/0x1b0 [ 287.529076][ T29] nmi_cpu_backtrace+0x27b/0x390 [ 287.534073][ T29] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 287.540170][ T29] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 287.546603][ T29] watchdog+0xf87/0x1210 [ 287.550929][ T29] ? __pfx_watchdog+0x10/0x10 [ 287.555619][ T29] ? lockdep_hardirqs_on+0x7d/0x110 [ 287.561447][ T29] ? __kthread_parkme+0x14b/0x220 [ 287.566841][ T29] ? __pfx_watchdog+0x10/0x10 [ 287.571715][ T29] kthread+0x2c6/0x3b0 [ 287.576142][ T29] ? _raw_spin_unlock_irq+0x23/0x50 [ 287.581447][ T29] ? __pfx_kthread+0x10/0x10 [ 287.586147][ T29] ret_from_fork+0x45/0x80 [ 287.590909][ T29] ? __pfx_kthread+0x10/0x10 [ 287.595727][ T29] ret_from_fork_asm+0x1b/0x30 [ 287.609898][ T29] [ 287.613397][ T29] Sending NMI from CPU 0 to CPUs 1: [ 287.618732][ C1] NMI backtrace for cpu 1 [ 287.618742][ C1] CPU: 1 PID: 4498 Comm: klogd Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0 [ 287.618765][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 287.618777][ C1] RIP: 0010:__sanitizer_cov_trace_switch+0x40/0x90 [ 287.618817][ C1] Code: 48 83 f8 20 74 6b 77 48 48 83 f8 08 74 5b 48 83 f8 10 75 2f 41 bd 03 00 00 00 4c 8b 75 00 31 db 4d 85 f6 74 1e 48 8b 74 dd 10 <4c> 89 e2 4c 89 ef 48 83 c3 01 48 8b 4c 24 28 e8 8c fd ff ff 49 39 [ 287.618837][ C1] RSP: 0018:ffffc90003477898 EFLAGS: 00000202 [ 287.618854][ C1] RAX: 0000000000000000 RBX: 0000000000000008 RCX: ffffffff8ab6756a [ 287.618868][ C1] RDX: ffff88807eba8000 RSI: 0000000000000011 RDI: 0000000000000001 [ 287.618882][ C1] RBP: ffffffff8c5c02a0 R08: 0000000000000001 R09: 0000000000000010 [ 287.618895][ C1] R10: 000000000000000f R11: fffffffffffe3968 R12: 000000000000000f [ 287.618909][ C1] R13: 0000000000000001 R14: 000000000000000a R15: 000000000000000f [ 287.618922][ C1] FS: 00007f515f5c7380(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000 [ 287.618945][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 287.618967][ C1] CR2: 000055f7b9a9b680 CR3: 000000002fab0000 CR4: 00000000003506f0 [ 287.618981][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 287.618994][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 287.619008][ C1] Call Trace: [ 287.619014][ C1] [ 287.619021][ C1] ? show_regs+0x8f/0xa0 [ 287.619055][ C1] ? nmi_cpu_backtrace+0x1d8/0x390 [ 287.619084][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 287.619115][ C1] ? nmi_handle+0x1a9/0x580 [ 287.619135][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90 [ 287.619167][ C1] ? default_do_nmi+0x6a/0x160 [ 287.619195][ C1] ? exc_nmi+0x18a/0x210 [ 287.619221][ C1] ? end_repeat_nmi+0xf/0x60 [ 287.619313][ C1] ? vsnprintf+0x7ba/0x1870 [ 287.619372][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90 [ 287.619404][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90 [ 287.619437][ C1] ? __sanitizer_cov_trace_switch+0x40/0x90 [ 287.619469][ C1] [ 287.619475][ C1] [ 287.619481][ C1] vsnprintf+0x7ba/0x1870 [ 287.619514][ C1] ? __pfx_vsnprintf+0x10/0x10 [ 287.619545][ C1] ? __pfx_vsnprintf+0x10/0x10 [ 287.619579][ C1] snprintf+0xc8/0x100 [ 287.619609][ C1] ? __pfx_snprintf+0x10/0x10 [ 287.619640][ C1] ? __pfx_sprintf+0x10/0x10 [ 287.619672][ C1] ? get_data+0x39b/0x550 [ 287.619724][ C1] info_print_prefix+0x135/0x350 [ 287.619774][ C1] ? __pfx_info_print_prefix+0x10/0x10 [ 287.619804][ C1] ? __pfx__prb_read_valid+0x10/0x10 [ 287.619829][ C1] record_print_text+0x143/0x410 [ 287.619858][ C1] ? __pfx_lock_release+0x10/0x10 [ 287.619887][ C1] ? __pfx_record_print_text+0x10/0x10 [ 287.619916][ C1] ? __pfx_prb_read_valid+0x10/0x10 [ 287.619943][ C1] syslog_print+0x4e9/0x5d0 [ 287.619977][ C1] ? __pfx_syslog_print+0x10/0x10 [ 287.620005][ C1] ? avc_has_perm_noaudit+0x145/0x3a0 [ 287.620107][ C1] ? __pfx_autoremove_wake_function+0x10/0x10 [ 287.620163][ C1] ? __pfx_avc_has_perm+0x10/0x10 [ 287.620191][ C1] ? selinux_syslog+0xf2/0x2e0 [ 287.620255][ C1] ? security_syslog+0x8e/0xb0 [ 287.620333][ C1] do_syslog+0x2d8/0x580 [ 287.620366][ C1] ? __pfx_do_syslog+0x10/0x10 [ 287.620403][ C1] __x64_sys_syslog+0x74/0xb0 [ 287.620436][ C1] ? lockdep_hardirqs_on+0x7d/0x110 [ 287.620469][ C1] do_syscall_64+0xd5/0x270 [ 287.620491][ C1] entry_SYSCALL_64_after_hwframe+0x6f/0x77 [ 287.620525][ C1] RIP: 0033:0x7f515f728fa7 [ 287.620541][ C1] Code: 73 01 c3 48 8b 0d 81 ce 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 67 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 51 ce 0c 00 f7 d8 64 89 01 48 [ 287.620561][ C1] RSP: 002b:00007ffea3471978 EFLAGS: 00000206 ORIG_RAX: 0000000000000067 [ 287.620581][ C1] RAX: ffffffffffffffda RBX: 00007f515f8c74a0 RCX: 00007f515f728fa7 [ 287.620595][ C1] RDX: 00000000000003ff RSI: 00007f515f8c74a0 RDI: 0000000000000002 [ 287.620609][ C1] RBP: 0000000000000000 R08: 0000000000000007 R09: 277d4c939d8b5048 [ 287.620622][ C1] R10: 0000000000004000 R11: 0000000000000206 R12: 00007f515f8c74a0 [ 287.620636][ C1] R13: 00007f515f8b7212 R14: 00007f515f8c7535 R15: 00007f515f8c7535 [ 287.620654][ C1] [ 287.620735][ T29] Kernel panic - not syncing: hung_task: blocked tasks [ 288.050484][ T29] CPU: 0 PID: 29 Comm: khungtaskd Not tainted 6.8.0-rc4-syzkaller-g7e90b5c295ec #0 [ 288.059795][ T29] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024 [ 288.070153][ T29] Call Trace: [ 288.073437][ T29] [ 288.076373][ T29] dump_stack_lvl+0xd9/0x1b0 [ 288.080984][ T29] panic+0x6ee/0x7a0 [ 288.085056][ T29] ? __pfx_panic+0x10/0x10 [ 288.089746][ T29] ? preempt_schedule_thunk+0x1a/0x30 [ 288.095307][ T29] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 288.101472][ T29] ? preempt_schedule_thunk+0x1a/0x30 [ 288.106950][ T29] ? watchdog+0xd3e/0x1210 [ 288.111393][ T29] ? watchdog+0xd31/0x1210 [ 288.115994][ T29] watchdog+0xd4f/0x1210 [ 288.120535][ T29] ? __pfx_watchdog+0x10/0x10 [ 288.125230][ T29] ? lockdep_hardirqs_on+0x7d/0x110 [ 288.130443][ T29] ? __kthread_parkme+0x14b/0x220 [ 288.135649][ T29] ? __pfx_watchdog+0x10/0x10 [ 288.140422][ T29] kthread+0x2c6/0x3b0 [ 288.144507][ T29] ? _raw_spin_unlock_irq+0x23/0x50 [ 288.149716][ T29] ? __pfx_kthread+0x10/0x10 [ 288.154316][ T29] ret_from_fork+0x45/0x80 [ 288.158748][ T29] ? __pfx_kthread+0x10/0x10 [ 288.163607][ T29] ret_from_fork_asm+0x1b/0x30 [ 288.168567][ T29] [ 288.171855][ T29] Kernel Offset: disabled [ 288.176269][ T29] Rebooting in 86400 seconds..