Warning: Permanently added '10.128.0.155' (ED25519) to the list of known hosts. executing program [ 43.829317][ T3966] INFO: trying to register non-static key. [ 43.830901][ T3966] The code is fine but needs lockdep annotation, or maybe [ 43.832740][ T3966] you didn't initialize this object before use? [ 43.834384][ T3966] turning off the locking correctness validator. [ 43.836029][ T3966] CPU: 0 PID: 3966 Comm: syz-executor113 Not tainted 5.15.162-syzkaller #0 [ 43.838207][ T3966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.840818][ T3966] Call trace: [ 43.841636][ T3966] dump_backtrace+0x0/0x530 [ 43.842821][ T3966] show_stack+0x2c/0x3c [ 43.843921][ T3966] dump_stack_lvl+0x108/0x170 [ 43.845110][ T3966] dump_stack+0x1c/0x58 [ 43.846172][ T3966] assign_lock_key+0x1e4/0x1f0 [ 43.847397][ T3966] register_lock_class+0x148/0x6a4 [ 43.848792][ T3966] __lock_acquire+0x184/0x7638 [ 43.850055][ T3966] lock_acquire+0x240/0x77c [ 43.851225][ T3966] _raw_spin_lock_irqsave+0xc4/0x14c [ 43.852581][ T3966] gsmld_write+0x60/0x164 [ 43.853710][ T3966] file_tty_write+0x44c/0x758 [ 43.854921][ T3966] tty_write+0x48/0x58 [ 43.855972][ T3966] vfs_write+0x87c/0xb3c [ 43.857109][ T3966] ksys_write+0x15c/0x26c [ 43.858261][ T3966] __arm64_sys_write+0x7c/0x90 [ 43.859515][ T3966] invoke_syscall+0x98/0x2b8 [ 43.860693][ T3966] el0_svc_common+0x138/0x258 [ 43.861916][ T3966] do_el0_svc+0x58/0x14c [ 43.863013][ T3966] el0_svc+0x7c/0x1f0 [ 43.864049][ T3966] el0t_64_sync_handler+0x84/0xe4 [ 43.865371][ T3966] el0t_64_sync+0x1a0/0x1a4 [ 43.866573][ T3966] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 43.869063][ T3966] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 3966, name: syz-executor113 [ 43.871581][ T3966] INFO: lockdep is turned off. [ 43.872811][ T3966] irq event stamp: 1176 [ 43.873866][ T3966] hardirqs last enabled at (1175): [] el0_svc_common+0x9c/0x258 [ 43.876412][ T3966] hardirqs last disabled at (1176): [] _raw_spin_lock_irqsave+0xfc/0x14c [ 43.879142][ T3966] softirqs last enabled at (606): [] handle_softirqs+0xb88/0xdbc [ 43.881683][ T3966] softirqs last disabled at (601): [] __irq_exit_rcu+0x268/0x4d8 [ 43.884188][ T3966] Preemption disabled at: [ 43.884194][ T3966] [] gsmld_write+0x60/0x164 [ 43.886966][ T3966] CPU: 0 PID: 3966 Comm: syz-executor113 Not tainted 5.15.162-syzkaller #0 [ 43.889157][ T3966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 43.891962][ T3966] Call trace: [ 43.892878][ T3966] dump_backtrace+0x0/0x530 [ 43.894039][ T3966] show_stack+0x2c/0x3c [ 43.895116][ T3966] dump_stack_lvl+0x108/0x170 [ 43.896349][ T3966] dump_stack+0x1c/0x58 [ 43.897478][ T3966] ___might_sleep+0x380/0x4dc [ 43.898716][ T3966] __might_sleep+0x98/0xf0 [ 43.899937][ T3966] console_lock+0x30/0x16c [ 43.901104][ T3966] do_con_write+0x110/0x5934 [ 43.902294][ T3966] con_write+0x34/0x58 [ 43.903387][ T3966] gsmld_write+0x108/0x164 [ 43.904555][ T3966] file_tty_write+0x44c/0x758 [ 43.905771][ T3966] tty_write+0x48/0x58 [ 43.906870][ T3966] vfs_write+0x87c/0xb3c [ 43.907988][ T3966] ksys_write+0x15c/0x26c [ 43.909113][ T3966] __arm64_sys_write+0x7c/0x90 [ 43.910340][ T3966] invoke_syscall+0x98/0x2b8 [ 43.911560][ T3966] el0_svc_common+0x138/0x258 [ 43.912791][ T3966] do_el0_svc+0x58/0x14c [ 43.913891][ T3966] el0_svc+0x7c/0x1f0 [ 43.914932][ T3966] el0t_64_sync_handler+0x84/0xe4 [ 43.916294][ T3966] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 44.861543][ T4057] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 44.863932][ T4057] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4057, name: syz-executor113 [ 44.866282][ T4057] INFO: lockdep is turned off. [ 44.867447][ T4057] irq event stamp: 0 [ 44.868410][ T4057] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 44.870194][ T4057] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 44.872634][ T4057] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 44.875028][ T4057] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 44.876956][ T4057] Preemption disabled at: [ 44.876962][ T4057] [] gsmld_write+0x60/0x164 [ 44.879681][ T4057] CPU: 1 PID: 4057 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 44.882378][ T4057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 44.885041][ T4057] Call trace: [ 44.885932][ T4057] dump_backtrace+0x0/0x530 [ 44.887162][ T4057] show_stack+0x2c/0x3c [ 44.888258][ T4057] dump_stack_lvl+0x108/0x170 [ 44.889498][ T4057] dump_stack+0x1c/0x58 [ 44.890577][ T4057] ___might_sleep+0x380/0x4dc [ 44.891741][ T4057] __might_sleep+0x98/0xf0 [ 44.892927][ T4057] console_lock+0x30/0x16c [ 44.894145][ T4057] do_con_write+0x110/0x5934 [ 44.895364][ T4057] con_write+0x34/0x58 [ 44.896402][ T4057] gsmld_write+0x108/0x164 [ 44.897520][ T4057] file_tty_write+0x44c/0x758 [ 44.898744][ T4057] tty_write+0x48/0x58 [ 44.899884][ T4057] vfs_write+0x87c/0xb3c [ 44.901070][ T4057] ksys_write+0x15c/0x26c [ 44.902220][ T4057] __arm64_sys_write+0x7c/0x90 [ 44.903478][ T4057] invoke_syscall+0x98/0x2b8 [ 44.904734][ T4057] el0_svc_common+0x138/0x258 [ 44.905987][ T4057] do_el0_svc+0x58/0x14c [ 44.907100][ T4057] el0_svc+0x7c/0x1f0 [ 44.908219][ T4057] el0t_64_sync_handler+0x84/0xe4 [ 44.909505][ T4057] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 45.865408][ T4145] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 45.867951][ T4145] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4145, name: syz-executor113 [ 45.870541][ T4145] INFO: lockdep is turned off. [ 45.871790][ T4145] irq event stamp: 0 [ 45.872834][ T4145] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 45.874691][ T4145] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 45.877184][ T4145] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 45.879703][ T4145] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 45.881698][ T4145] Preemption disabled at: [ 45.881704][ T4145] [] gsmld_write+0x60/0x164 [ 45.884519][ T4145] CPU: 0 PID: 4145 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 45.887303][ T4145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 45.889909][ T4145] Call trace: [ 45.890791][ T4145] dump_backtrace+0x0/0x530 [ 45.892005][ T4145] show_stack+0x2c/0x3c [ 45.893122][ T4145] dump_stack_lvl+0x108/0x170 [ 45.894436][ T4145] dump_stack+0x1c/0x58 [ 45.895551][ T4145] ___might_sleep+0x380/0x4dc [ 45.896868][ T4145] __might_sleep+0x98/0xf0 [ 45.898010][ T4145] console_lock+0x30/0x16c [ 45.899295][ T4145] do_con_write+0x110/0x5934 [ 45.900496][ T4145] con_write+0x34/0x58 [ 45.901554][ T4145] gsmld_write+0x108/0x164 [ 45.902733][ T4145] file_tty_write+0x44c/0x758 [ 45.904030][ T4145] tty_write+0x48/0x58 [ 45.905118][ T4145] vfs_write+0x87c/0xb3c [ 45.906222][ T4145] ksys_write+0x15c/0x26c [ 45.907357][ T4145] __arm64_sys_write+0x7c/0x90 [ 45.908691][ T4145] invoke_syscall+0x98/0x2b8 [ 45.909917][ T4145] el0_svc_common+0x138/0x258 [ 45.911214][ T4145] do_el0_svc+0x58/0x14c [ 45.912337][ T4145] el0_svc+0x7c/0x1f0 [ 45.913428][ T4145] el0t_64_sync_handler+0x84/0xe4 [ 45.914793][ T4145] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 46.870450][ T4233] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 46.873019][ T4233] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4233, name: syz-executor113 [ 46.875514][ T4233] INFO: lockdep is turned off. [ 46.876750][ T4233] irq event stamp: 0 [ 46.877787][ T4233] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 46.879685][ T4233] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 46.882121][ T4233] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 46.884535][ T4233] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 46.886412][ T4233] Preemption disabled at: [ 46.886419][ T4233] [] gsmld_write+0x60/0x164 [ 46.889145][ T4233] CPU: 1 PID: 4233 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 46.891787][ T4233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 46.894543][ T4233] Call trace: [ 46.895369][ T4233] dump_backtrace+0x0/0x530 [ 46.896540][ T4233] show_stack+0x2c/0x3c [ 46.897633][ T4233] dump_stack_lvl+0x108/0x170 [ 46.898852][ T4233] dump_stack+0x1c/0x58 [ 46.899977][ T4233] ___might_sleep+0x380/0x4dc [ 46.901217][ T4233] __might_sleep+0x98/0xf0 [ 46.902358][ T4233] console_lock+0x30/0x16c [ 46.903526][ T4233] do_con_write+0x110/0x5934 [ 46.904764][ T4233] con_write+0x34/0x58 [ 46.905902][ T4233] gsmld_write+0x108/0x164 [ 46.907019][ T4233] file_tty_write+0x44c/0x758 [ 46.908282][ T4233] tty_write+0x48/0x58 [ 46.909429][ T4233] vfs_write+0x87c/0xb3c [ 46.910689][ T4233] ksys_write+0x15c/0x26c [ 46.912008][ T4233] __arm64_sys_write+0x7c/0x90 [ 46.913278][ T4233] invoke_syscall+0x98/0x2b8 [ 46.914509][ T4233] el0_svc_common+0x138/0x258 [ 46.915706][ T4233] do_el0_svc+0x58/0x14c [ 46.916799][ T4233] el0_svc+0x7c/0x1f0 [ 46.917886][ T4233] el0t_64_sync_handler+0x84/0xe4 [ 46.919367][ T4233] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 47.862399][ T4320] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 47.864893][ T4320] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4320, name: syz-executor113 [ 47.867316][ T4320] INFO: lockdep is turned off. [ 47.868502][ T4320] irq event stamp: 0 [ 47.869453][ T4320] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 47.871226][ T4320] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 47.873756][ T4320] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 47.876111][ T4320] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 47.877994][ T4320] Preemption disabled at: [ 47.878001][ T4320] [] gsmld_write+0x60/0x164 [ 47.880799][ T4320] CPU: 1 PID: 4320 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 47.883568][ T4320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 47.886224][ T4320] Call trace: [ 47.887043][ T4320] dump_backtrace+0x0/0x530 [ 47.888278][ T4320] show_stack+0x2c/0x3c [ 47.889368][ T4320] dump_stack_lvl+0x108/0x170 [ 47.890611][ T4320] dump_stack+0x1c/0x58 [ 47.891678][ T4320] ___might_sleep+0x380/0x4dc [ 47.892850][ T4320] __might_sleep+0x98/0xf0 [ 47.894003][ T4320] console_lock+0x30/0x16c [ 47.895187][ T4320] do_con_write+0x110/0x5934 [ 47.896338][ T4320] con_write+0x34/0x58 [ 47.897712][ T4320] gsmld_write+0x108/0x164 [ 47.898850][ T4320] file_tty_write+0x44c/0x758 [ 47.900061][ T4320] tty_write+0x48/0x58 [ 47.901147][ T4320] vfs_write+0x87c/0xb3c [ 47.902245][ T4320] ksys_write+0x15c/0x26c [ 47.903499][ T4320] __arm64_sys_write+0x7c/0x90 [ 47.904770][ T4320] invoke_syscall+0x98/0x2b8 [ 47.906021][ T4320] el0_svc_common+0x138/0x258 [ 47.907290][ T4320] do_el0_svc+0x58/0x14c [ 47.908433][ T4320] el0_svc+0x7c/0x1f0 [ 47.909448][ T4320] el0t_64_sync_handler+0x84/0xe4 [ 47.910803][ T4320] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 48.867399][ T4408] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 48.869911][ T4408] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4408, name: syz-executor113 [ 48.872476][ T4408] INFO: lockdep is turned off. [ 48.873708][ T4408] irq event stamp: 0 [ 48.874724][ T4408] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 48.876579][ T4408] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 48.879012][ T4408] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 48.881346][ T4408] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 48.883277][ T4408] Preemption disabled at: [ 48.883284][ T4408] [] gsmld_write+0x60/0x164 [ 48.886132][ T4408] CPU: 0 PID: 4408 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 48.888747][ T4408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 48.891425][ T4408] Call trace: [ 48.891431][ T4408] dump_backtrace+0x0/0x530 [ 48.891446][ T4408] show_stack+0x2c/0x3c [ 48.894673][ T4408] dump_stack_lvl+0x108/0x170 [ 48.895879][ T4408] dump_stack+0x1c/0x58 [ 48.896979][ T4408] ___might_sleep+0x380/0x4dc [ 48.898210][ T4408] __might_sleep+0x98/0xf0 [ 48.899361][ T4408] console_lock+0x30/0x16c [ 48.900536][ T4408] do_con_write+0x110/0x5934 [ 48.901752][ T4408] con_write+0x34/0x58 [ 48.902844][ T4408] gsmld_write+0x108/0x164 [ 48.904067][ T4408] file_tty_write+0x44c/0x758 [ 48.905288][ T4408] tty_write+0x48/0x58 [ 48.906393][ T4408] vfs_write+0x87c/0xb3c [ 48.907522][ T4408] ksys_write+0x15c/0x26c [ 48.908708][ T4408] __arm64_sys_write+0x7c/0x90 [ 48.909983][ T4408] invoke_syscall+0x98/0x2b8 [ 48.911169][ T4408] el0_svc_common+0x138/0x258 [ 48.912352][ T4408] do_el0_svc+0x58/0x14c [ 48.913434][ T4408] el0_svc+0x7c/0x1f0 [ 48.914454][ T4408] el0t_64_sync_handler+0x84/0xe4 [ 48.915770][ T4408] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 49.862492][ T4495] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 49.865051][ T4495] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4495, name: syz-executor113 [ 49.867591][ T4495] INFO: lockdep is turned off. [ 49.868821][ T4495] irq event stamp: 0 [ 49.869842][ T4495] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 49.871690][ T4495] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 49.874343][ T4495] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 49.876966][ T4495] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 49.878941][ T4495] Preemption disabled at: [ 49.878949][ T4495] [] gsmld_write+0x60/0x164 [ 49.881750][ T4495] CPU: 0 PID: 4495 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 49.884472][ T4495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 49.887173][ T4495] Call trace: [ 49.888082][ T4495] dump_backtrace+0x0/0x530 [ 49.889242][ T4495] show_stack+0x2c/0x3c [ 49.890331][ T4495] dump_stack_lvl+0x108/0x170 [ 49.891615][ T4495] dump_stack+0x1c/0x58 [ 49.892701][ T4495] ___might_sleep+0x380/0x4dc [ 49.893937][ T4495] __might_sleep+0x98/0xf0 [ 49.895176][ T4495] console_lock+0x30/0x16c [ 49.896472][ T4495] do_con_write+0x110/0x5934 [ 49.897667][ T4495] con_write+0x34/0x58 [ 49.898847][ T4495] gsmld_write+0x108/0x164 [ 49.900050][ T4495] file_tty_write+0x44c/0x758 [ 49.901273][ T4495] tty_write+0x48/0x58 [ 49.902374][ T4495] vfs_write+0x87c/0xb3c [ 49.903533][ T4495] ksys_write+0x15c/0x26c [ 49.904657][ T4495] __arm64_sys_write+0x7c/0x90 [ 49.905958][ T4495] invoke_syscall+0x98/0x2b8 [ 49.907196][ T4495] el0_svc_common+0x138/0x258 [ 49.908412][ T4495] do_el0_svc+0x58/0x14c [ 49.909556][ T4495] el0_svc+0x7c/0x1f0 [ 49.910651][ T4495] el0t_64_sync_handler+0x84/0xe4 [ 49.911991][ T4495] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 50.867434][ T4583] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 50.869881][ T4583] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4583, name: syz-executor113 [ 50.872329][ T4583] INFO: lockdep is turned off. [ 50.873558][ T4583] irq event stamp: 0 [ 50.874596][ T4583] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 50.876409][ T4583] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 50.878822][ T4583] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 50.881262][ T4583] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 50.883163][ T4583] Preemption disabled at: [ 50.883169][ T4583] [] gsmld_write+0x60/0x164 [ 50.885930][ T4583] CPU: 1 PID: 4583 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 50.888491][ T4583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 50.891104][ T4583] Call trace: [ 50.891942][ T4583] dump_backtrace+0x0/0x530 [ 50.893131][ T4583] show_stack+0x2c/0x3c [ 50.894222][ T4583] dump_stack_lvl+0x108/0x170 [ 50.895414][ T4583] dump_stack+0x1c/0x58 [ 50.896495][ T4583] ___might_sleep+0x380/0x4dc [ 50.897728][ T4583] __might_sleep+0x98/0xf0 [ 50.898860][ T4583] console_lock+0x30/0x16c [ 50.900070][ T4583] do_con_write+0x110/0x5934 [ 50.901290][ T4583] con_write+0x34/0x58 [ 50.902402][ T4583] gsmld_write+0x108/0x164 [ 50.903593][ T4583] file_tty_write+0x44c/0x758 [ 50.904806][ T4583] tty_write+0x48/0x58 [ 50.905862][ T4583] vfs_write+0x87c/0xb3c [ 50.907009][ T4583] ksys_write+0x15c/0x26c [ 50.908161][ T4583] __arm64_sys_write+0x7c/0x90 [ 50.909403][ T4583] invoke_syscall+0x98/0x2b8 [ 50.910611][ T4583] el0_svc_common+0x138/0x258 [ 50.911830][ T4583] do_el0_svc+0x58/0x14c [ 50.912962][ T4583] el0_svc+0x7c/0x1f0 [ 50.914015][ T4583] el0t_64_sync_handler+0x84/0xe4 [ 50.915322][ T4583] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 51.872314][ T4672] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 51.874764][ T4672] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4672, name: syz-executor113 [ 51.877097][ T4672] INFO: lockdep is turned off. [ 51.878252][ T4672] irq event stamp: 0 [ 51.879220][ T4672] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 51.881008][ T4672] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 51.883453][ T4672] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 51.885936][ T4672] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 51.887797][ T4672] Preemption disabled at: [ 51.887804][ T4672] [] gsmld_write+0x60/0x164 [ 51.890568][ T4672] CPU: 1 PID: 4672 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 51.893302][ T4672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 51.896001][ T4672] Call trace: [ 51.896904][ T4672] dump_backtrace+0x0/0x530 [ 51.898144][ T4672] show_stack+0x2c/0x3c [ 51.899222][ T4672] dump_stack_lvl+0x108/0x170 [ 51.900466][ T4672] dump_stack+0x1c/0x58 [ 51.901584][ T4672] ___might_sleep+0x380/0x4dc [ 51.902874][ T4672] __might_sleep+0x98/0xf0 [ 51.904096][ T4672] console_lock+0x30/0x16c [ 51.905272][ T4672] do_con_write+0x110/0x5934 [ 51.906502][ T4672] con_write+0x34/0x58 [ 51.907622][ T4672] gsmld_write+0x108/0x164 [ 51.908857][ T4672] file_tty_write+0x44c/0x758 [ 51.910078][ T4672] tty_write+0x48/0x58 [ 51.911157][ T4672] vfs_write+0x87c/0xb3c [ 51.912346][ T4672] ksys_write+0x15c/0x26c [ 51.913476][ T4672] __arm64_sys_write+0x7c/0x90 [ 51.914750][ T4672] invoke_syscall+0x98/0x2b8 [ 51.915915][ T4672] el0_svc_common+0x138/0x258 [ 51.917152][ T4672] do_el0_svc+0x58/0x14c [ 51.918262][ T4672] el0_svc+0x7c/0x1f0 [ 51.919300][ T4672] el0t_64_sync_handler+0x84/0xe4 [ 51.920614][ T4672] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 52.876128][ T4760] BUG: sleeping function called from invalid context at kernel/printk/printk.c:2555 [ 52.878746][ T4760] in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 4760, name: syz-executor113 [ 52.881338][ T4760] INFO: lockdep is turned off. [ 52.882594][ T4760] irq event stamp: 0 [ 52.883603][ T4760] hardirqs last enabled at (0): [<0000000000000000>] 0x0 [ 52.885533][ T4760] hardirqs last disabled at (0): [] copy_process+0x129c/0x3750 [ 52.888016][ T4760] softirqs last enabled at (0): [] copy_process+0x12c4/0x3750 [ 52.890515][ T4760] softirqs last disabled at (0): [<0000000000000000>] 0x0 [ 52.892458][ T4760] Preemption disabled at: [ 52.892464][ T4760] [] gsmld_write+0x60/0x164 [ 52.895304][ T4760] CPU: 0 PID: 4760 Comm: syz-executor113 Tainted: G W 5.15.162-syzkaller #0 [ 52.898119][ T4760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 52.900802][ T4760] Call trace: [ 52.901668][ T4760] dump_backtrace+0x0/0x530 [ 52.902847][ T4760] show_stack+0x2c/0x3c [ 52.903951][ T4760] dump_stack_lvl+0x108/0x170 [ 52.905268][ T4760] dump_stack+0x1c/0x58 [ 52.906376][ T4760] ___might_sleep+0x380/0x4dc [ 52.907596][ T4760] __might_sleep+0x98/0xf0 [ 52.908797][ T4760] console_lock+0x30/0x16c [ 52.909973][ T4760] do_con_write+0x110/0x5934 [ 52.911194][ T4760] con_write+0x34/0x58 [ 52.912285][ T4760] gsmld_write+0x108/0x164 [ 52.913474][ T4760] file_tty_write+0x44c/0x758 [ 52.914700][ T4760] tty_write+0x48/0x58 [ 52.915776][ T4760] vfs_write+0x87c/0xb3c [ 52.916872][ T4760] ksys_write+0x15c/0x26c [ 52.918057][ T4760] __arm64_sys_write+0x7c/0x90 [ 52.919341][ T4760] invoke_syscall+0x98/0x2b8 [ 52.920590][ T4760] el0_svc_common+0x138/0x258 [ 52.921804][ T4760] do_el0_svc+0x58/0x14c [ 52.922984][ T4760] el0_svc+0x7c/0x1f0 [ 52.924049][ T4760] el0t_64_sync_handler+0x84/0xe4 [ 52.925496][ T4760] el0t_64_sync+0x1a0/0x1a4 executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program