watchdog: BUG: soft lockup - CPU#1 stuck for 143s! [syz-executor.0:6990] Modules linked in: irq event stamp: 30837 hardirqs last enabled at (30836): [] asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:649 hardirqs last disabled at (30837): [] sysvec_apic_timer_interrupt+0xf/0xc0 arch/x86/kernel/apic/apic.c:1107 softirqs last enabled at (916): [] lock_sock include/net/sock.h:1725 [inline] softirqs last enabled at (916): [] vsock_connect+0x471/0xa70 net/vmw_vsock/af_vsock.c:1420 softirqs last disabled at (918): [] spin_lock_bh include/linux/spinlock.h:355 [inline] softirqs last disabled at (918): [] virtio_transport_purge_skbs+0xc4/0x780 net/vmw_vsock/virtio_transport_common.c:1372 CPU: 1 PID: 6990 Comm: syz-executor.0 Not tainted 6.2.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 RIP: 0010:virtio_transport_purge_skbs+0x135/0x780 net/vmw_vsock/virtio_transport_common.c:1373 Code: 84 4f 01 00 00 48 8d 70 10 48 bd 00 00 00 00 00 fc ff df 48 89 f1 48 c1 e9 03 48 01 e9 eb 23 4c 89 fa 48 c1 ea 03 80 3c 2a 00 <0f> 85 58 03 00 00 4c 39 f8 49 8b 17 4c 89 fb 0f 84 15 01 00 00 49 RSP: 0018:ffffc9000afffb80 EFLAGS: 00000246 RAX: ffffffff90efc7c8 RBX: ffffc90003bcfc50 RCX: fffffbfff21df8fb RDX: 1ffff92000779f8a RSI: ffffffff90efc7d8 RDI: ffffc90003bcfc68 RBP: dffffc0000000000 R08: ffff88801d2da200 R09: ffffffff90efc7e0 R10: fffff520015fff62 R11: 0000000000000000 R12: ffffc9000afffbd8 R13: 0000000000000000 R14: 1ffff920015fff77 R15: ffffc90003bcfc50 FS: 00007f56b1a18700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f56b19f7718 CR3: 000000007f8a8000 CR4: 0000000000350ee0 Call Trace: vsock_loopback_cancel_pkt+0x10/0x20 net/vmw_vsock/vsock_loopback.c:48 vsock_transport_cancel_pkt net/vmw_vsock/af_vsock.c:1284 [inline] vsock_connect+0x57b/0xa70 net/vmw_vsock/af_vsock.c:1426 __sys_connect+0xf9/0x130 net/socket.c:2018 __do_sys_connect net/socket.c:2028 [inline] __se_sys_connect net/socket.c:2025 [inline] __x64_sys_connect+0x6e/0xb0 net/socket.c:2025 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd RIP: 0033:0x7f56b0c8c0f9 Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007f56b1a18168 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 00007f56b0dabf80 RCX: 00007f56b0c8c0f9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 RBP: 00007f56b0ce7b39 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007ffd1f59887f R14: 00007f56b1a18300 R15: 0000000000022000 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 5080 Comm: kworker/0:3 Not tainted 6.2.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/02/2023 Workqueue: vsock-loopback vsock_loopback_work RIP: 0010:halt arch/x86/include/asm/irqflags.h:99 [inline] RIP: 0010:kvm_wait+0xc5/0x100 arch/x86/kernel/kvm.c:1054 Code: f4 48 83 c4 10 c3 89 74 24 0c 48 89 3c 24 e8 92 b7 48 00 8b 74 24 0c 48 8b 3c 24 e9 6a ff ff ff eb 07 0f 00 2d dc 60 37 08 f4 bf 89 74 24 0c 48 89 3c 24 e8 bc 36 88 00 8b 74 24 0c 48 8b 3c RSP: 0018:ffffc90003bcf7e0 EFLAGS: 00000046 RAX: 0000000000000003 RBX: 0000000000000000 RCX: dffffc0000000000 RDX: 0000000000000000 RSI: 0000000000000003 RDI: ffffffff90efc7e0 RBP: ffffffff90efc7e0 R08: 0000000000000001 R09: ffffffff90efc7e0 R10: fffffbfff21df8fc R11: 0000000000000000 R12: 0000000000000000 R13: fffffbfff21df8fc R14: 0000000000000001 R15: ffff8880b9a3cf40 FS: 0000000000000000(0000) GS:ffff8880b9a00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f56b0dad988 CR3: 000000007f8a8000 CR4: 0000000000350ef0 Call Trace: pv_wait arch/x86/include/asm/paravirt.h:603 [inline] pv_wait_head_or_lock kernel/locking/qspinlock_paravirt.h:470 [inline] __pv_queued_spin_lock_slowpath+0x8cb/0xb50 kernel/locking/qspinlock.c:511 pv_queued_spin_lock_slowpath arch/x86/include/asm/paravirt.h:591 [inline] queued_spin_lock_slowpath arch/x86/include/asm/qspinlock.h:51 [inline] queued_spin_lock include/asm-generic/qspinlock.h:114 [inline] do_raw_spin_lock+0x204/0x2b0 kernel/locking/spinlock_debug.c:115 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:111 [inline] _raw_spin_lock_irqsave+0x45/0x60 kernel/locking/spinlock.c:162 skb_queue_tail+0x20/0x140 net/core/skbuff.c:3570 vsock_loopback_send_pkt+0x4a/0x80 net/vmw_vsock/vsock_loopback.c:36 virtio_transport_reset_no_sock.isra.0+0x31d/0x410 net/vmw_vsock/virtio_transport_common.c:869 virtio_transport_recv_pkt+0xd07/0x2930 net/vmw_vsock/virtio_transport_common.c:1291 vsock_loopback_work+0x310/0x440 net/vmw_vsock/vsock_loopback.c:122 process_one_work+0x8ba/0x14c0 kernel/workqueue.c:2289 worker_thread+0x59c/0xec0 kernel/workqueue.c:2436 kthread+0x298/0x340 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308