INFO: task kworker/u8:12:1474 blocked for more than 143 seconds. Tai[ 1079.677398][ T38] Tainted: G L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u8:12 state:D stack:21312 pid:1474 tgid:1474 ppid:2 task_flags:0x4208160 flags:0x00080000 Workqueue: netns cleanup_net Call Trace: context_switch kernel/sched/core.c:5295 [inline] __schedule+0x14fb/0x52c0 kernel/sched/core.c:6907 __schedule_loop kernel/sched/core.c:6989 [inline] schedule+0x164/0x360 kernel/sched/core.c:7004 rxrpc_destroy_all_calls+0x57e/0x6a0 net/rxrpc/call_object.c:757 rxrpc_exit_net+0x6f/0xc0 net/rxrpc/net_ns.c:112 ops_exit_list net/core/net_namespace.c:199 [inline] ops_undo_list+0x49f/0x940 net/core/net_namespace.c:252 cleanup_net+0x56e/0x800 net/core/net_namespace.c:704 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Showing all locks held in the system: 1 lock held by khungtaskd/38: #0: ffffffff8ddcd780 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #0: ffffffff8ddcd780 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #0: ffffffff8ddcd780 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x2e/0x180 kernel/locking/lockdep.c:6775 3 locks held by kworker/u8:12/1474: #0: ffff88801aed9138 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3250 [inline] #0: ffff88801aed9138 ((wq_completion)netns){+.+.}-{0:0}, at: process_scheduled_works+0x9ea/0x1830 kernel/workqueue.c:3358 #1: ffffc900061c7c40 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3251 [inline] #1: ffffc900061c7c40 (net_cleanup_work){+.+.}-{0:0}, at: process_scheduled_works+0xa25/0x1830 kernel/workqueue.c:3358 #2: ffffffff8f14ba00 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xf4/0x800 net/core/net_namespace.c:675 2 locks held by getty/5557: #0: ffff8880376f60a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x25/0x70 drivers/tty/tty_ldisc.c:243 #1: ffffc90003e762e0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x462/0x13c0 drivers/tty/n_tty.c:2211 10 locks held by syz-executor/5808: 1 lock held by syz.0.17486/15395: ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 38 Comm: khungtaskd Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 nmi_cpu_backtrace+0x274/0x2d0 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x17a/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:161 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x135/0x170 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:346 [inline] watchdog+0xfd9/0x1030 kernel/hung_task.c:515 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 5808 Comm: syz-executor Tainted: G L syzkaller #0 PREEMPT_{RT,(full)} Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x80 kernel/kcov.c:210 Code: 89 fb e8 23 00 00 00 48 8b 3d a4 9c bb 0b 48 89 de 5b e9 73 8b 5a 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0d c8 ac 89 10 65 8b 35 e9 ac 89 RSP: 0018:ffffc9000482f308 EFLAGS: 00000246 RAX: 0000000000000000 RBX: 8000000051319007 RCX: ffff8880417d9e40 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000 R10: dffffc0000000000 R11: fffff940002898c9 R12: ffff888058d167a0 R13: 8000000051319007 R14: ffff8880358ac4e0 R15: ffff888063356600 FS: 0000555594566500(0000) GS:ffff888126440000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000200000000180 CR3: 0000000044d04000 CR4: 00000000003526f0 Call Trace: page_table_check_pte_flags mm/page_table_check.c:194 [inline] __page_table_check_ptes_set+0x65/0x320 mm/page_table_check.c:210 page_table_check_ptes_set include/linux/page_table_check.h:83 [inline] set_ptes include/linux/pgtable.h:413 [inline] __copy_present_ptes mm/memory.c:1115 [inline] copy_present_ptes mm/memory.c:1194 [inline] copy_pte_range mm/memory.c:1317 [inline] copy_pmd_range+0x3ad6/0x7c00 mm/memory.c:1405 copy_pud_range mm/memory.c:1442 [inline] copy_p4d_range mm/memory.c:1466 [inline] copy_page_range+0xaf4/0x1120 mm/memory.c:1552 dup_mmap+0xf4c/0x1d50 mm/mmap.c:1841 dup_mm kernel/fork.c:1530 [inline] copy_mm+0x13b/0x4b0 kernel/fork.c:1582 copy_process+0x18be/0x3d00 kernel/fork.c:2223 kernel_clone+0x249/0x840 kernel/fork.c:2654 __do_sys_clone kernel/fork.c:2795 [inline] __se_sys_clone kernel/fork.c:2779 [inline] __x64_sys_clone+0x1b6/0x230 kernel/fork.c:2779 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x14d/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7f28cc955212 Code: 89 e7 e8 71 8b f7 ff 45 31 c0 31 d2 31 f6 64 48 8b 04 25 10 00 00 00 bf 11 00 20 01 4c 8d 90 d0 02 00 00 b8 38 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 66 89 c5 85 c0 75 3b 64 48 8b 04 25 10 00 00 RSP: 002b:00007ffeb089dcf0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 RAX: ffffffffffffffda RBX: 00007ffeb089dcf0 RCX: 00007f28cc955212 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 RBP: 00007ffeb089de7c R08: 0000000000000000 R09: 0000000000000001 R10: 00005555945667d0 R11: 0000000000000246 R12: 0000000000000001 R13: 00000000000927c0 R14: 000000000010f3f1 R15: 00007ffeb089ded0