Warning: Permanently added '10.128.0.85' (ECDSA) to the list of known hosts. executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 132.145304][ C0] watchdog: BUG: soft lockup - CPU#0 stuck for 27s! [syz-executor244:6747] [ 132.147919][ C0] Modules linked in: [ 132.148786][ C0] irq event stamp: 6033 [ 132.149748][ C0] hardirqs last enabled at (6032): [] exit_to_kernel_mode+0xe8/0x118 [ 132.152155][ C0] hardirqs last disabled at (6033): [] el1_interrupt+0x24/0x68 [ 132.154363][ C0] softirqs last enabled at (616): [] lock_sock_nested+0xe8/0x138 [ 132.156598][ C0] softirqs last disabled at (618): [] virtio_transport_purge_skbs+0x11c/0x500 [ 132.159161][ C0] CPU: 0 PID: 6747 Comm: syz-executor244 Not tainted 6.3.0-rc1-syzkaller-gfe15c26ee26e #0 [ 132.161492][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 132.163815][ C0] pstate: 80400005 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 132.165620][ C0] pc : __sanitizer_cov_trace_pc+0xc/0x8c [ 132.166941][ C0] lr : virtio_transport_purge_skbs+0x19c/0x500 [ 132.168471][ C0] sp : ffff80001e787890 [ 132.169474][ C0] x29: ffff80001e7879e0 x28: 1ffff00003cf0f2a x27: ffff80001a487a60 [ 132.171353][ C0] x26: ffff80001e787950 x25: ffff0000ce2d3b80 x24: ffff80001a487a78 [ 132.173247][ C0] x23: 1ffff00003490f4c x22: ffff80001a29c1a8 x21: dfff800000000000 [ 132.175183][ C0] x20: ffff80001a487a60 x19: ffff80001e787940 x18: 1fffe000368951b6 [ 132.177081][ C0] x17: ffff800015cdd000 x16: ffff8000085110b0 x15: 0000000000000000 [ 132.178986][ C0] x14: 1ffff00002b9c0b2 x13: dfff800000000000 x12: ffff700003cf0efc [ 132.180900][ C0] x11: ff808000122dbee8 x10: 0000000000000000 x9 : ffff8000122dbee8 [ 132.182753][ C0] x8 : ffff0000ce511b40 x7 : ffff8000122dbcfc x6 : 0000000000000000 [ 132.184587][ C0] x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff80000832d758 [ 132.186474][ C0] x2 : 0000000000000001 x1 : 0000000000000000 x0 : 0000000000000000 [ 132.188393][ C0] Call trace: [ 132.189145][ C0] __sanitizer_cov_trace_pc+0xc/0x8c [ 132.190368][ C0] vsock_loopback_cancel_pkt+0x28/0x3c [ 132.191660][ C0] vsock_connect+0x6b8/0xaec [ 132.192768][ C0] __sys_connect+0x268/0x290 [ 132.193901][ C0] __arm64_sys_connect+0x7c/0x94 [ 132.195056][ C0] invoke_syscall+0x98/0x2c0 [ 132.196144][ C0] el0_svc_common+0x138/0x258 [ 132.197278][ C0] do_el0_svc+0x64/0x198 [ 132.198258][ C0] el0_svc+0x58/0x168 [ 132.199204][ C0] el0t_64_sync_handler+0x84/0xf0 [ 132.200355][ C0] el0t_64_sync+0x190/0x194 [ 132.201506][ C0] Kernel panic - not syncing: softlockup: hung tasks [ 132.203022][ C0] CPU: 0 PID: 6747 Comm: syz-executor244 Tainted: G L 6.3.0-rc1-syzkaller-gfe15c26ee26e #0 [ 132.205718][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 132.208066][ C0] Call trace: [ 132.208782][ C0] dump_backtrace+0x1c8/0x1f4 [ 132.209873][ C0] show_stack+0x2c/0x3c [ 132.210863][ C0] dump_stack_lvl+0xd0/0x124 [ 132.211942][ C0] dump_stack+0x1c/0x28 [ 132.212879][ C0] panic+0x2f0/0x7c8 [ 132.213804][ C0] softlockup_fn+0x0/0x120 [ 132.214814][ C0] __hrtimer_run_queues+0x578/0x10e8 [ 132.216002][ C0] hrtimer_interrupt+0x2c0/0xb64 [ 132.217187][ C0] arch_timer_handler_virt+0x74/0x88 [ 132.218455][ C0] handle_percpu_devid_irq+0x174/0x354 [ 132.219781][ C0] generic_handle_domain_irq+0x7c/0xc4 [ 132.221181][ C0] gic_handle_irq+0x70/0x1e4 [ 132.222233][ C0] call_on_irq_stack+0x24/0x4c [ 132.223344][ C0] do_interrupt_handler+0xd4/0x138 [ 132.224544][ C0] el1_interrupt+0x34/0x68 [ 132.225584][ C0] el1h_64_irq_handler+0x18/0x24 [ 132.226758][ C0] el1h_64_irq+0x64/0x68 [ 132.227749][ C0] __sanitizer_cov_trace_pc+0xc/0x8c [ 132.229015][ C0] vsock_loopback_cancel_pkt+0x28/0x3c [ 132.230286][ C0] vsock_connect+0x6b8/0xaec [ 132.231365][ C0] __sys_connect+0x268/0x290 [ 132.232517][ C0] __arm64_sys_connect+0x7c/0x94 [ 132.233750][ C0] invoke_syscall+0x98/0x2c0 [ 132.234868][ C0] el0_svc_common+0x138/0x258 [ 132.236036][ C0] do_el0_svc+0x64/0x198 [ 132.237069][ C0] el0_svc+0x58/0x168 [ 132.238044][ C0] el0t_64_sync_handler+0x84/0xf0 [ 132.239245][ C0] el0t_64_sync+0x190/0x194 [ 132.240313][ C0] SMP: stopping secondary CPUs [ 133.327247][ C0] SMP: failed to stop secondary CPUs 0-1 [ 133.328611][ C0] Kernel Offset: disabled [ 133.329668][ C0] CPU features: 0x000000,20700402,32017203 [ 133.331019][ C0] Memory Limit: none [ 133.344425][ C0] [ 133.344976][ C0] ================================ [ 133.346036][ C0] WARNING: inconsistent lock state [ 133.347156][ C0] 6.3.0-rc1-syzkaller-gfe15c26ee26e #0 Tainted: G L [ 133.348808][ C0] -------------------------------- [ 133.349860][ C0] inconsistent {HARDIRQ-ON-W} -> {IN-HARDIRQ-W} usage. [ 133.351334][ C0] syz-executor244/6747 [HC1[1]:SC0[2]:HE0:SE0] takes: [ 133.352814][ C0] ffff800015d20fd8 (efi_rt_lock){?...}-{2:2}, at: virt_efi_set_variable_nonblocking+0x74/0x16c [ 133.355145][ C0] {HARDIRQ-ON-W} state was registered at: [ 133.356546][ C0] lock_acquire+0x2f0/0x8c8 [ 133.357671][ C0] _raw_spin_lock+0x54/0x6c [ 133.358667][ C0] efi_call_rts+0x280/0x9d8 [ 133.359758][ C0] process_one_work+0x868/0x16f4 [ 133.360890][ C0] worker_thread+0x8e0/0xfe8 [ 133.361987][ C0] kthread+0x24c/0x2d4 [ 133.362874][ C0] ret_from_fork+0x10/0x20 [ 133.363915][ C0] irq event stamp: 6033 [ 133.364771][ C0] hardirqs last enabled at (6032): [] exit_to_kernel_mode+0xe8/0x118 [ 133.366853][ C0] hardirqs last disabled at (6033): [] el1_interrupt+0x24/0x68 [ 133.368755][ C0] softirqs last enabled at (616): [] lock_sock_nested+0xe8/0x138 [ 133.370811][ C0] softirqs last disabled at (618): [] virtio_transport_purge_skbs+0x11c/0x500 [ 133.373140][ C0] [ 133.373140][ C0] other info that might help us debug this: [ 133.374976][ C0] Possible unsafe locking scenario: [ 133.374976][ C0] [ 133.376526][ C0] CPU0 [ 133.377251][ C0] ---- [ 133.377958][ C0] lock(efi_rt_lock); [ 133.378893][ C0] [ 133.379611][ C0] lock(efi_rt_lock); [ 133.380489][ C0] [ 133.380489][ C0] *** DEADLOCK *** [ 133.380489][ C0] [ 133.382219][ C0] 4 locks held by syz-executor244/6747: [ 133.383416][ C0] #0: ffff0000ce2d3cb0 (sk_lock-AF_VSOCK){+.+.}-{0:0}, at: vsock_connect+0x36c/0xaec [ 133.385481][ C0] #1: ffff80001a29c1d8 (&list->lock#6){+...}-{2:2}, at: virtio_transport_purge_skbs+0x11c/0x500 [ 133.387918][ C0] #2: ffff800015eb7ac0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire+0x18/0x54 [ 133.390040][ C0] #3: ffff800017dac0c8 (&psinfo->buf_lock){....}-{2:2}, at: pstore_dump+0x17c/0xa2c [ 133.392136][ C0] [ 133.392136][ C0] stack backtrace: [ 133.393439][ C0] CPU: 0 PID: 6747 Comm: syz-executor244 Tainted: G L 6.3.0-rc1-syzkaller-gfe15c26ee26e #0 [ 133.395988][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 [ 133.398311][ C0] Call trace: [ 133.399032][ C0] dump_backtrace+0x1c8/0x1f4 [ 133.400113][ C0] show_stack+0x2c/0x3c [ 133.401027][ C0] dump_stack_lvl+0xd0/0x124 [ 133.402064][ C0] dump_stack+0x1c/0x28 [ 133.402996][ C0] print_usage_bug+0x654/0x9b0 [ 133.404114][ C0] mark_lock_irq+0x980/0xd2c [ 133.405168][ C0] mark_lock+0x258/0x360 [ 133.406082][ C0] __lock_acquire+0xb4c/0x764c [ 133.407106][ C0] lock_acquire+0x2f0/0x8c8 [ 133.408098][ C0] _raw_spin_lock+0x54/0x6c [ 133.409163][ C0] virt_efi_set_variable_nonblocking+0x74/0x16c [ 133.410566][ C0] efivar_set_variable_locked+0x1e4/0x20c [ 133.411719][ C0] efi_pstore_write+0x424/0x64c [ 133.412788][ C0] pstore_dump+0x64c/0xa2c [ 133.413748][ C0] kmsg_dump+0x184/0x27c [ 133.414700][ C0] panic+0x338/0x7c8 [ 133.415566][ C0] softlockup_fn+0x0/0x120 [ 133.416542][ C0] __hrtimer_run_queues+0x578/0x10e8 [ 133.417742][ C0] hrtimer_interrupt+0x2c0/0xb64 [ 133.418876][ C0] arch_timer_handler_virt+0x74/0x88 [ 133.420054][ C0] handle_percpu_devid_irq+0x174/0x354 [ 133.421289][ C0] generic_handle_domain_irq+0x7c/0xc4 [ 133.422456][ C0] gic_handle_irq+0x70/0x1e4 [ 133.423475][ C0] call_on_irq_stack+0x24/0x4c [ 133.424566][ C0] do_interrupt_handler+0xd4/0x138 [ 133.425684][ C0] el1_interrupt+0x34/0x68 [ 133.426646][ C0] el1h_64_irq_handler+0x18/0x24 [ 133.427757][ C0] el1h_64_irq+0x64/0x68 [ 133.428657][ C0] __sanitizer_cov_trace_pc+0xc/0x8c [ 133.429806][ C0] vsock_loopback_cancel_pkt+0x28/0x3c [ 133.431048][ C0] vsock_connect+0x6b8/0xaec [ 133.432048][ C0] __sys_connect+0x268/0x290 [ 133.433150][ C0] __arm64_sys_connect+0x7c/0x94 [ 133.434198][ C0] invoke_syscall+0x98/0x2c0 [ 133.435154][ C0] el0_svc_common+0x138/0x258 [ 133.436161][ C0] do_el0_svc+0x64/0x198 [ 133.437130][ C0] el0_svc+0x58/0x168 [ 133.437955][ C0] el0t_64_sync_handler+0x84/0xf0 [ 133.439009][ C0] el0t_64_sync+0x190/0x194 [ 133.755367][ C0] Rebooting in 86400 seconds..