vkms_vblank_simulate: vblank timer overrun watchdog: BUG: soft lockup - CPU#1 stuck for 21s! [syz.3.93:7316] Modules linked in: irq event stamp: 22736 hardirqs last enabled at (22735): [] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] hardirqs last enabled at (22735): [] _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 hardirqs last disabled at (22736): [] enter_from_kernel_mode+0x14/0x34 arch/arm64/kernel/entry-common.c:42 softirqs last enabled at (19426): [] local_bh_enable+0x10/0x34 include/linux/bottom_half.h:32 softirqs last disabled at (19424): [] local_bh_disable+0x10/0x34 include/linux/bottom_half.h:19 CPU: 1 UID: 0 PID: 7316 Comm: syz.3.93 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] pc : _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 lr : __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] lr : _raw_spin_unlock_irqrestore+0x38/0x98 kernel/locking/spinlock.c:194 sp : ffff8000a2ce73f0 x29: ffff8000a2ce73f0 x28: dfff800000000000 x27: ffff8000a2ce74c0 x26: ffff0000d4bc53c0 x25: ffff0000d4bc53c0 x24: 0000000000000001 x23: ffff0000c94cdc58 x22: 0000000000000000 x21: ffff0000c94cdc40 x20: ffff0000d4bc5380 x19: 0000000000000000 x18: 1fffe000337db690 x17: ffff80008f59e000 x16: ffff80008052bd88 x15: 0000000000000001 x14: 1fffe0001a978a70 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 0000000000000003 x9 : 0000000000000000 x8 : 00000000000000c0 x7 : ffff800080503970 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000001 x3 : 0000000000000010 x2 : 0000000000000006 x1 : ffff80008eb9b3b1 x0 : ffff80010c9ee000 Call trace: __daif_local_irq_restore arch/arm64/include/asm/irqflags.h:175 [inline] (P) arch_local_irq_restore arch/arm64/include/asm/irqflags.h:195 [inline] (P) __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline] (P) _raw_spin_unlock_irqrestore+0x44/0x98 kernel/locking/spinlock.c:194 (P) spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] prepare_to_wait_exclusive+0x1c4/0x22c kernel/sched/wait.c:275 unix_wait_for_peer+0xe4/0x250 net/unix/af_unix.c:1630 unix_dgram_sendmsg+0x8c4/0x1334 net/unix/af_unix.c:2273 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x490/0x7b8 net/socket.c:2630 ___sys_sendmsg+0x204/0x278 net/socket.c:2684 __sys_sendmmsg+0x1f4/0x548 net/socket.c:2773 __do_sys_sendmmsg net/socket.c:2800 [inline] __se_sys_sendmmsg net/socket.c:2797 [inline] __arm64_sys_sendmmsg+0xa0/0xbc net/socket.c:2797 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 7331 Comm: syz.1.94 Not tainted syzkaller #0 PREEMPT Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/03/2025 pstate: 63400005 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--) pc : csd_lock_wait kernel/smp.c:342 [inline] pc : smp_call_function_many_cond+0xee8/0x1418 kernel/smp.c:877 lr : csd_lock_wait kernel/smp.c:342 [inline] lr : smp_call_function_many_cond+0xf00/0x1418 kernel/smp.c:877 sp : ffff8000a0627500 x29: ffff8000a0627610 x28: 0000000000000011 x27: ffff00019becda40 x26: 0000000000000001 x25: ffff80008f5a1f28 x24: ffffffffffffffff x23: 1fffe000337d9b48 x22: dfff800000000000 x21: 1fffe000337d9b49 x20: ffff00019bef6888 x19: ffff00019becda48 x18: 0000000000000000 x17: 20202000256c6920 x16: ffff800082dee3c0 x15: 0000000000000001 x14: 1fffe000337ded11 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000080000 x10: 000000000007ffff x9 : 0000000000000000 x8 : 0000000000000011 x7 : ffff80008022ce28 x6 : 0000000000000000 x5 : 0000000000000001 x4 : 0000000000000000 x3 : ffff80008068ea94 x2 : 0000000000000000 x1 : 0000000000000004 x0 : 0000000000000001 Call trace: __cmpwait_case_32 arch/arm64/include/asm/cmpxchg.h:231 [inline] (P) __cmpwait arch/arm64/include/asm/cmpxchg.h:257 [inline] (P) csd_lock_wait kernel/smp.c:342 [inline] (P) smp_call_function_many_cond+0xee8/0x1418 kernel/smp.c:877 (P) smp_call_function_many kernel/smp.c:900 [inline] smp_call_function kernel/smp.c:922 [inline] kick_all_cpus_sync+0x40/0xa0 kernel/smp.c:1067 flush_icache_range arch/arm64/include/asm/cacheflush.h:103 [inline] __text_poke+0xd4/0xf4 arch/arm64/kernel/patching.c:130 aarch64_insn_copy+0x3c/0x50 arch/arm64/kernel/patching.c:161 bpf_arch_text_copy+0x34/0x54 arch/arm64/net/bpf_jit_comp.c:2271 bpf_jit_binary_pack_finalize+0x44/0xf0 kernel/bpf/core.c:1161 bpf_int_jit_compile+0xc30/0x1240 arch/arm64/net/bpf_jit_comp.c:2204 bpf_prog_select_runtime+0x3d8/0x6b8 kernel/bpf/core.c:2505 bpf_prog_load+0xf68/0x1490 kernel/bpf/syscall.c:3081 __sys_bpf+0x45c/0x638 kernel/bpf/syscall.c:6149 __do_sys_bpf kernel/bpf/syscall.c:6259 [inline] __se_sys_bpf kernel/bpf/syscall.c:6257 [inline] __arm64_sys_bpf+0x80/0x98 kernel/bpf/syscall.c:6257 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x98/0x254 arch/arm64/kernel/syscall.c:49 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:132 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151 el0_svc+0x5c/0x254 arch/arm64/kernel/entry-common.c:724 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:743 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:596