INFO: task kworker/u8:25:8994 blocked for more than 143 seconds. Not tainted syzkaller #0 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. task:kworker/u8:25 state:D stack:24376 pid:8994 tgid:8994 ppid:2 task_flags:0x4208160 flags:0x00080000 Workqueue: netns cleanup_net Call Trace: context_switch kernel/sched/core.c:5325 [inline] __schedule+0x1190/0x5de0 kernel/sched/core.c:6929 __schedule_loop kernel/sched/core.c:7011 [inline] schedule+0xe7/0x3a0 kernel/sched/core.c:7026 schedule_timeout+0x257/0x290 kernel/time/sleep_timeout.c:75 do_wait_for_common kernel/sched/completion.c:100 [inline] __wait_for_common+0x2fc/0x4e0 kernel/sched/completion.c:121 __flush_workqueue+0x3e2/0x1230 kernel/workqueue.c:4029 rds_tcp_listen_stop+0x104/0x150 net/rds/tcp_listen.c:331 rds_tcp_kill_sock net/rds/tcp.c:611 [inline] rds_tcp_exit_net+0xcb/0x810 net/rds/tcp.c:634 ops_exit_list net/core/net_namespace.c:199 [inline] ops_undo_list+0x2ee/0xab0 net/core/net_namespace.c:252 cleanup_net+0x41b/0x8b0 net/core/net_namespace.c:695 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3263 process_scheduled_works kernel/workqueue.c:3346 [inline] worker_thread+0x6c8/0xf10 kernel/workqueue.c:3427 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Showing all locks held in the system: 1 lock held by khungtaskd/31: #0: ffffffff8e3c45e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline] #0: ffffffff8e3c45e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline] #0: ffffffff8e3c45e0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 kernel/locking/lockdep.c:6775 3 locks held by kworker/u8:25/8994: #0: ffff88801ba9f148 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3238 #1: ffffc9000519fd00 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3239 #2: ffffffff900d52b0 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xad/0x8b0 net/core/net_namespace.c:669 2 locks held by getty/9315: #0: ffff88803453f0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 drivers/tty/tty_ldisc.c:243 #1: ffffc9000b59b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 drivers/tty/n_tty.c:2222 2 locks held by syz.1.1227/11358: 3 locks held by kworker/u10:4/12141: #0: ffff88813ff29948 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 kernel/workqueue.c:3238 #1: ffffc90003d9fd00 ((linkwatch_work).work){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 kernel/workqueue.c:3239 #2: ffffffff900eb6c8 (rtnl_mutex){+.+.}-{4:4}, at: linkwatch_event+0x51/0xc0 net/core/link_watch.c:303 1 lock held by syz.3.1548/12770: #0: ffffffff900d52b0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x2d6/0x690 net/core/net_namespace.c:576 1 lock held by syz-executor/12988: #0: ffffffff8e3cfb78 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x1a3/0x3c0 kernel/rcu/tree_exp.h:343 1 lock held by syz.0.1822/13982: #0: ffffffff900d52b0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x2d6/0x690 net/core/net_namespace.c:576 1 lock held by syz.2.1834/14031: #0: ffffffff900d52b0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x2d6/0x690 net/core/net_namespace.c:576 1 lock held by syz.5.1859/14237: #0: ffffffff900d52b0 (pernet_ops_rwsem){++++}-{4:4}, at: copy_net_ns+0x2d6/0x690 net/core/net_namespace.c:576 2 locks held by syz-executor/14250: 1 lock held by syz-executor/14254: #0: ffffffff8e3cfb78 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock+0x1a3/0x3c0 kernel/rcu/tree_exp.h:343 2 locks held by syz-executor/14444: #0: ffffffff8f492c00 (&ops->srcu#2){.+.+}-{0:0}, at: srcu_lock_acquire include/linux/srcu.h:161 [inline] #0: ffffffff8f492c00 (&ops->srcu#2){.+.+}-{0:0}, at: srcu_read_lock include/linux/srcu.h:253 [inline] #0: ffffffff8f492c00 (&ops->srcu#2){.+.+}-{0:0}, at: rtnl_link_ops_get+0x113/0x2c0 net/core/rtnetlink.c:574 #1: ffffffff900eb6c8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock net/core/rtnetlink.c:80 [inline] #1: ffffffff900eb6c8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_nets_lock net/core/rtnetlink.c:341 [inline] #1: ffffffff900eb6c8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_newlink+0x600/0x2000 net/core/rtnetlink.c:4064 1 lock held by syz.1.1923/14474: #0: ffff888079f17ac8 (&sb->s_type->i_mutex_key#11){+.+.}-{4:4}, at: inode_lock include/linux/fs.h:980 [inline] #0: ffff888079f17ac8 (&sb->s_type->i_mutex_key#11){+.+.}-{4:4}, at: __sock_release+0x86/0x270 net/socket.c:661 ============================================= NMI backtrace for cpu 1 CPU: 1 UID: 0 PID: 31 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Call Trace: __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120 nmi_cpu_backtrace+0x27b/0x390 lib/nmi_backtrace.c:113 nmi_trigger_cpumask_backtrace+0x29c/0x300 lib/nmi_backtrace.c:62 trigger_all_cpu_backtrace include/linux/nmi.h:160 [inline] check_hung_uninterruptible_tasks kernel/hung_task.c:332 [inline] watchdog+0xf3f/0x1170 kernel/hung_task.c:495 kthread+0x3c5/0x780 kernel/kthread.c:463 ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 Sending NMI from CPU 1 to CPUs 0: NMI backtrace for cpu 0 CPU: 0 UID: 0 PID: 12988 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 RIP: 0010:__nr_to_section include/linux/mmzone.h:1966 [inline] RIP: 0010:__pfn_to_section include/linux/mmzone.h:2104 [inline] RIP: 0010:lookup_page_ext+0xa3/0x1d0 mm/page_ext.c:251 Code: 00 00 00 00 fc ff df 48 c1 e8 03 80 3c 10 00 0f 85 30 01 00 00 4c 8b 2d 7b 0b 83 18 4d 85 ed 0f 84 f1 00 00 00 e8 bd c3 8c ff <49> 8d 6c ed 00 48 b8 00 00 00 00 00 fc ff df 48 89 ea 48 c1 ea 03 RSP: 0018:ffffc90002ec7ac0 EFLAGS: 00000293 RAX: 0000000000000000 RBX: 0000000000055d08 RCX: ffffffff822f9391 RDX: ffff88807ea51e40 RSI: ffffffff822f93d3 RDI: 0000000000000006 RBP: 0000000000000000 R08: 0000000000000006 R09: 0000000000001000 R10: 0000000000000000 R11: 0000000000000001 R12: 000000000000000a R13: ffff88823ffef400 R14: 0000000000000000 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff888124a0d000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00002000006d8000 CR3: 000000007eeea000 CR4: 00000000003526f0 Call Trace: page_ext_iter_begin include/linux/page_ext.h:132 [inline] __page_table_check_zero+0x1a4/0x5d0 mm/page_table_check.c:139 page_table_check_free include/linux/page_table_check.h:43 [inline] free_pages_prepare mm/page_alloc.c:1395 [inline] __free_frozen_pages+0x7d0/0x1160 mm/page_alloc.c:2901 vfree+0x1fd/0xb50 mm/vmalloc.c:3440 kcov_put kernel/kcov.c:439 [inline] kcov_put kernel/kcov.c:435 [inline] kcov_close+0x34/0x60 kernel/kcov.c:535 __fput+0x402/0xb70 fs/file_table.c:468 task_work_run+0x150/0x240 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x86f/0x2bf0 kernel/exit.c:966 do_group_exit+0xd3/0x2a0 kernel/exit.c:1107 __do_sys_exit_group kernel/exit.c:1118 [inline] __se_sys_exit_group kernel/exit.c:1116 [inline] __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1116 x64_sys_call+0x150b/0x1730 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fae5578f7c9 Code: Unable to access opcode bytes at 0x7fae5578f79f. RSP: 002b:00007fffe902bbb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fae5578f7c9 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000043 RBP: 00007fae55815619 R08: 00007fffe9029956 R09: 00000000000927c0 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000020 R13: 00000000000927c0 R14: 00000000000957b8 R15: 00007fffe902bd70