INFO: task syz.3.923:10675 blocked for more than 143 seconds. Tainted: G U L syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:syz.3.923 state:D stack:25976 pid:10675 tgid:10673 ppid:5625 task_flags:0x400140 flags:0x00080002 Call Trace: context_switch kernel/sched/core.c:5388 [inline] __schedule+0x10e9/0x6820 kernel/sched/core.c:7189 __schedule_loop kernel/sched/core.c:7268 [inline] schedule+0xdd/0x390 kernel/sched/core.c:7283 kvm_swap_active_memslots+0x2e0/0x7c0 virt/kvm/kvm_main.c:1620 kvm_activate_memslot virt/kvm/kvm_main.c:1779 [inline] kvm_create_memslot virt/kvm/kvm_main.c:1845 [inline] kvm_set_memslot+0xbde/0x1740 virt/kvm/kvm_main.c:1957 kvm_set_memory_region+0xe1c/0x1570 virt/kvm/kvm_main.c:2113 kvm_set_internal_memslot+0x9f/0xf0 virt/kvm/kvm_main.c:2136 __x86_set_memory_region+0x2f6/0x730 arch/x86/kvm/x86.c:13471 kvm_alloc_apic_access_page+0xad/0x120 arch/x86/kvm/lapic.c:2866 vmx_vcpu_create+0x79b/0xb90 arch/x86/kvm/vmx/vmx.c:7745 kvm_arch_vcpu_create+0x683/0xac0 arch/x86/kvm/x86.c:12900 kvm_vm_ioctl_create_vcpu virt/kvm/kvm_main.c:4200 [inline] kvm_vm_ioctl+0x756/0x4050 virt/kvm/kvm_main.c:5158 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:597 [inline] __se_sys_ioctl fs/ioctl.c:583 [inline] __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x10b/0xf80 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fc61d99cdd9 RSP: 002b:00007fc61e8ee028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 RAX: ffffffffffffffda RBX: 00007fc61dc15fa0 RCX: 00007fc61d99cdd9 RDX: 0000000000000003 RSI: 000000000000ae41 RDI: 0000000000000003 RBP: 00007fc61da32d69 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 R13: 00007fc61dc16038 R14: 00007fc61dc15fa0 R15: 00007fffa3982e88 Showing all locks held in the system: 1 lock held by khungtaskd/30: #0: ffffffff8e7e52e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:300 [inline] #0: ffffffff8e7e52e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline] #0: ffffffff8e7e52e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x3d/0x184 kernel/locking/lockdep.c:6775 2 locks held by getty/5385: #0: ffff8880378280a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc9000322b2e8 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x419/0x14f0 drivers/tty/n_tty.c:2211 1 lock held by syz-executor/5627: 4 locks held by kworker/u8:26/9887: #0: ffff88801c6ae140 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12d6/0x1980 kernel/workqueue.c:3277 #1: ffffc90003f6fd08 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x973/0x1980 kernel/workqueue.c:3278 #2: ffffffff905f5728 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xb8/0x920 net/core/net_namespace.c:673 #3: ffffffff9060e460 (rtnl_mutex){+.+.}-{4:4}, at: fib_net_exit_batch+0x15/0x130 net/ipv4/fib_frontend.c:1676 2 locks held by syz.3.923/10675: #0: ffff88802aa9c0a0 (&kvm->slots_lock){+.+.}-{4:4}, at: class_mutex_constructor include/linux/mutex.h:253 [inline] #0: ffff88802aa9c0a0 (&kvm->slots_lock){+.+.}-{4:4}, at: kvm_alloc_apic_access_page+0x27/0x120 arch/x86/kvm/lapic.c:2860 #1: ffff88802aa9c128 (&kvm->slots_arch_lock){+.+.}-{4:4}, at: kvm_set_memslot+0x34/0x1740 virt/kvm/kvm_main.c:1908 1 lock held by syz.4.1492/13540: #0: ffffffff9060e460 (rtnl_mutex){+.+.}-{4:4}, at: tun_detach drivers/net/tun.c:634 [inline] #0: ffffffff9060e460 (rtnl_mutex){+.+.}-{4:4}, at: tun_chr_close+0x38/0x220 drivers/net/tun.c:3438 3 locks held by syz.1.1538/13766: #0: ffffffff905f5728 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x451/0x7c0 net/core/net_namespace.c:575 #1: ffffffff9060e460 (rtnl_mutex){+.+.}-{4:4}, at: ops_exit_rtnl_list net/core/net_namespace.c:173 [inline] #1: ffffffff9060e460 (rtnl_mutex){+.+.}-{4:4}, at: ops_undo_list+0x7ec/0xab0 net/core/net_namespace.c:248 #2: ffffffff8e7f0e28 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x27f/0x3c0 kernel/rcu/tree_exp.h:311 2 locks held by dhcpcd/13776: #0: ffff88803674c260 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1713 [inline] #0: ffff88803674c260 (sk_lock-AF_PACKET){+.+.}-{0:0}, at: packet_do_bind+0x2c/0xf50 net/packet/af_packet.c:3204 #1: ffffffff8e7f0e28 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x19e/0x3c0 kernel/rcu/tree_exp.h:343 ============================================= NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 30 Comm: khungtaskd Tainted: G U L syzkaller #0 PREEMPT(full) Tainted: [U]=USER, [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x100/0x190 lib/dump_stack.c:120 nmi_cpu_backtrace.cold+0x12d/0x151 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x1d7/0x230 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:162 [inline] __sys_info lib/sys_info.c:157 [inline] sys_info+0x141/0x190 lib/sys_info.c:165 check_hung_uninterruptible_tasks kernel/hung_task.c:353 [inline] watchdog+0xcb1/0x1030 kernel/hung_task.c:561 kthread+0x370/0x450 kernel/kthread.c:436 ret_from_fork+0x72b/0xd50 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245