kthread+0x346/0x3d0 kernel/kthread.c:313 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:298 watchdog: BUG: soft lockup - CPU#1 stuck for 123s! [syz.7.698:2768] Modules linked in: CPU: 1 PID: 2768 Comm: syz.7.698 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:csd_lock_wait kernel/smp.c:229 [inline] RIP: 0010:smp_call_function_single+0x209/0x490 kernel/smp.c:517 Code: 48 44 89 f6 83 e6 01 31 ff e8 13 88 0a 00 41 83 e6 01 49 bc 00 00 00 00 00 fc ff df 75 0a e8 4e 84 0a 00 e9 a4 00 00 00 f3 90 44 24 48 01 00 00 00 0f 84 8f 00 00 00 e8 34 84 0a 00 eb e9 e8 RSP: 0018:ffffc90000fcf620 EFLAGS: 00000293 RAX: ffffffff815a319c RBX: 0000000000000000 RCX: ffff88811552a780 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 RBP: ffffc90000fcf710 R08: ffff8881f7057647 R09: 1ffff1103ee0aec8 R10: dffffc0000000000 R11: ffffed103ee0aec9 R12: dffffc0000000000 R13: 0000000000000001 R14: 0000000000000001 R15: 1ffff920001f9ec8 FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f3575cdc000 CR3: 0000000122891000 CR4: 00000000003526a0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: loaded_vmcs_clear arch/x86/kvm/vmx/vmx.c:817 [inline] vmx_vcpu_load_vmcs+0xd6/0x810 arch/x86/kvm/vmx/vmx.c:1413 vmx_vcpu_load+0x1f/0x90 arch/x86/kvm/vmx/vmx.c:1483 kvm_arch_vcpu_load+0x12c/0x740 arch/x86/kvm/x86.c:4067 vcpu_load+0x55/0x90 virt/kvm/kvm_main.c:206 kvm_unload_vcpu_mmu arch/x86/kvm/x86.c:10699 [inline] kvm_free_vcpus arch/x86/kvm/x86.c:10714 [inline] kvm_arch_destroy_vm+0x2bd/0x740 arch/x86/kvm/x86.c:10812 kvm_destroy_vm virt/kvm/kvm_main.c:946 [inline] kvm_put_kvm+0x8fe/0x10d0 virt/kvm/kvm_main.c:968 kvm_vm_release+0x46/0x50 virt/kvm/kvm_main.c:991 __fput+0x2fb/0x770 fs/file_table.c:281 ____fput+0x15/0x20 fs/file_table.c:314 task_work_run+0x127/0x190 kernel/task_work.c:189 exit_task_work include/linux/task_work.h:33 [inline] do_exit+0xa90/0x2500 kernel/exit.c:872 do_group_exit+0x141/0x310 kernel/exit.c:986 get_signal+0xf7d/0x12e0 kernel/signal.c:2793 arch_do_signal_or_restart+0xe2/0x11d0 arch/x86/kernel/signal.c:805 handle_signal_work kernel/entry/common.c:145 [inline] exit_to_user_mode_loop+0xa2/0xe0 kernel/entry/common.c:169 exit_to_user_mode_prepare+0x76/0xa0 kernel/entry/common.c:199 syscall_exit_to_user_mode+0x1d/0x40 kernel/entry/common.c:274 do_syscall_64+0x3d/0x40 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7f7c74fe6cb9 Code: Unable to access opcode bytes at RIP 0x7f7c74fe6c8f. RSP: 002b:00007f7c73a220e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00007f7c75262098 RCX: 00007f7c74fe6cb9 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f7c75262098 RBP: 00007f7c75262090 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007f7c75262128 R14: 00007ffc51d68110 R15: 00007ffc51d681f8 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 PID: 2786 Comm: syz.1.704 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:preempt_count_add+0x32/0x1b0 kernel/sched/core.c:4456 Code: 53 49 bf 00 00 00 00 00 fc ff df 48 c7 c0 c0 f8 e7 86 48 c1 e8 03 42 0f b6 04 38 84 c0 0f 85 01 01 00 00 83 3d be 28 a3 05 00 <75> 07 65 8b 05 81 9d bd 7e 65 01 3d 7a 9d bd 7e 48 c7 c0 c0 f8 e7 RSP: 0018:ffffc9000102f978 EFLAGS: 00000046 RAX: 0000000000000004 RBX: ffffffff86f0efe0 RCX: ffffffff86e7f803 RDX: 0000000000000000 RSI: 0000000000000802 RDI: 0000000000000001 RBP: ffffc9000102f990 R08: 0000000000000003 R09: 0000000000000004 R10: dffffc0000000000 R11: fffff52000205f38 R12: 1ffff92000205f34 R13: dffffc0000000000 R14: 0000000000000802 R15: dffffc0000000000 FS: 00007fb62f4586c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000001b30621ff8 CR3: 0000000119f2a000 CR4: 00000000003526b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:109 [inline] _raw_spin_lock_irqsave+0x9a/0x130 kernel/locking/spinlock.c:159 vga_put drivers/gpu/vga/vgaarb.c:578 [inline] vga_arb_release+0x20e/0x930 drivers/gpu/vga/vgaarb.c:1370 __fput+0x2fb/0x770 fs/file_table.c:281 ____fput+0x15/0x20 fs/file_table.c:314 task_work_run+0x127/0x190 kernel/task_work.c:189 get_signal+0x125a/0x12e0 kernel/signal.c:2566 arch_do_signal_or_restart+0xe2/0x11d0 arch/x86/kernel/signal.c:805 handle_signal_work kernel/entry/common.c:145 [inline] exit_to_user_mode_loop+0xa2/0xe0 kernel/entry/common.c:169 exit_to_user_mode_prepare+0x76/0xa0 kernel/entry/common.c:199 syscall_exit_to_user_mode+0x1d/0x40 kernel/entry/common.c:274 do_syscall_64+0x3d/0x40 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x61/0xcb RIP: 0033:0x7fb630a1ccb9 Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007fb62f458028 EFLAGS: 00000246 ORIG_RAX: 000000000000010f RAX: 0000000000000002 RBX: 00007fb630c98090 RCX: 00007fb630a1ccb9 RDX: 0000000000000000 RSI: 0000000000000002 RDI: 00002000000000c0 RBP: 00007fb630a8abf7 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fb630c98128 R14: 00007fb630c98090 R15: 00007ffc7ff9a048