ip6_tunnel: ƒ xmit: Local address not yet configured! INFO: task syz-executor.4:18657 blocked for more than 140 seconds. Not tainted 4.9.170+ #48 "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. syz-executor.4 D27720 18657 1 0x00000004 ffff88016c63df00 0000000000000000 ffff8801db721000 ffff88018ee6df00 ffff8801db721018 ffff880186f4fc08 ffffffff82801a4e 0000000041b58ab3 ffffffff82e28708 00ffffff811ffe30 ffff8801db7218f0 1ffff10030de9f70 Call Trace: [<00000000965c1767>] schedule+0x92/0x1c0 kernel/sched/core.c:3546 [<0000000091196b10>] schedule_preempt_disabled+0x13/0x20 kernel/sched/core.c:3579 [<0000000070e5538d>] __mutex_lock_common kernel/locking/mutex.c:582 [inline] [<0000000070e5538d>] mutex_lock_nested+0x38d/0x920 kernel/locking/mutex.c:621 [<00000000a482c7d0>] copy_net_ns+0x15b/0x340 net/core/net_namespace.c:407 [<00000000548acf74>] create_new_namespaces+0x37c/0x7a0 kernel/nsproxy.c:106 [<00000000a9b3b3bf>] unshare_nsproxy_namespaces+0xab/0x1e0 kernel/nsproxy.c:205 [<00000000f98698c6>] SYSC_unshare kernel/fork.c:2276 [inline] [<00000000f98698c6>] SyS_unshare+0x305/0x6f0 kernel/fork.c:2226 [<00000000c6c594a1>] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285 [<00000000af8659e5>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Showing all locks held in the system: 2 locks held by kworker/1:0/18: #0: ("events"){.+.+.+}, at: [<0000000087e04256>] process_one_work+0x790/0x1600 kernel/workqueue.c:2107 #1: ((&rew.rew_work)){+.+...}, at: [<00000000eee52d84>] process_one_work+0x7ce/0x1600 kernel/workqueue.c:2111 2 locks held by khungtaskd/24: #0: (rcu_read_lock){......}, at: [<00000000a5a217e8>] check_hung_uninterruptible_tasks kernel/hung_task.c:169 [inline] #0: (rcu_read_lock){......}, at: [<00000000a5a217e8>] watchdog+0x14b/0xaf0 kernel/hung_task.c:263 #1: (tasklist_lock){.+.+..}, at: [<00000000b9e5a39f>] debug_show_all_locks+0x7f/0x21f kernel/locking/lockdep.c:4339 2 locks held by getty/2026: #0: (&tty->ldisc_sem){++++++}, at: [<000000001f7bed11>] ldsem_down_read+0x33/0x40 drivers/tty/tty_ldsem.c:377 #1: (&ldata->atomic_read_lock){+.+.+.}, at: [<00000000c2e20716>] n_tty_read+0x1fe/0x1820 drivers/tty/n_tty.c:2156 5 locks held by kworker/u4:24/12045: #0: ("%s""netns"){.+.+.+}, at: [<0000000087e04256>] process_one_work+0x790/0x1600 kernel/workqueue.c:2107 #1: (net_cleanup_work){+.+.+.}, at: [<00000000eee52d84>] process_one_work+0x7ce/0x1600 kernel/workqueue.c:2111 #2: (net_mutex){+.+.+.}, at: [<00000000e0025046>] cleanup_net+0x131/0x8a0 net/core/net_namespace.c:440 #3: (rtnl_mutex){+.+.+.}, at: [<00000000ba1eb923>] rtnl_lock+0x17/0x20 net/core/rtnetlink.c:70 #4: (rcu_preempt_state.exp_mutex){+.+...}, at: [<00000000d7e08354>] exp_funnel_lock kernel/rcu/tree_exp.h:256 [inline] #4: (rcu_preempt_state.exp_mutex){+.+...}, at: [<00000000d7e08354>] _synchronize_rcu_expedited+0x339/0x850 kernel/rcu/tree_exp.h:569 1 lock held by syz-executor.4/18657: #0: (net_mutex){+.+.+.}, at: [<00000000a482c7d0>] copy_net_ns+0x15b/0x340 net/core/net_namespace.c:407 ============================================= NMI backtrace for cpu 0 CPU: 0 PID: 24 Comm: khungtaskd Not tainted 4.9.170+ #48 ffff8801d98d7cc8 ffffffff81b4fb21 0000000000000000 0000000000000000 0000000000000000 ffffffff81097401 dffffc0000000000 ffff8801d98d7d00 ffffffff81b5adbc 0000000000000000 0000000000000000 0000000000000000 Call Trace: [<000000001af73ca0>] __dump_stack lib/dump_stack.c:15 [inline] [<000000001af73ca0>] dump_stack+0xc1/0x120 lib/dump_stack.c:51 [<0000000007f0caac>] nmi_cpu_backtrace.cold+0x47/0x87 lib/nmi_backtrace.c:99 [<00000000b942d8db>] nmi_trigger_cpumask_backtrace+0x124/0x155 lib/nmi_backtrace.c:60 [<00000000b2d99456>] arch_trigger_cpumask_backtrace+0x14/0x20 arch/x86/kernel/apic/hw_nmi.c:37 [<000000001a81bb5a>] trigger_all_cpu_backtrace include/linux/nmi.h:58 [inline] [<000000001a81bb5a>] check_hung_task kernel/hung_task.c:126 [inline] [<000000001a81bb5a>] check_hung_uninterruptible_tasks kernel/hung_task.c:183 [inline] [<000000001a81bb5a>] watchdog+0x670/0xaf0 kernel/hung_task.c:263 [<00000000d97fe21f>] kthread+0x278/0x310 kernel/kthread.c:211 [<0000000047c3ecde>] ret_from_fork+0x5c/0x70 arch/x86/entry/entry_64.S:373 Sending NMI from CPU 0 to CPUs 1: NMI backtrace for cpu 1 CPU: 1 PID: 32002 Comm: syz-executor.3 Not tainted 4.9.170+ #48 task: 00000000f4249267 task.stack: 00000000b18f60ae RIP: 0010:[] c [<00000000a7d1cb0e>] page_fault+0x0/0x30 arch/x86/entry/entry_64.S:951 RSP: 0018:ffff8801711f7ce0 EFLAGS: 00000002 RAX: 0000000000000007 RBX: 0000000000000000 RCX: 0000000000000001 RDX: 0000000000000000 RSI: ffffffff81b83be5 RDI: ffff8801711f7e20 RBP: ffff8801711f7d40 R08: 1ffff1002e23efc4 R09: ffffed002e23efc6 R10: ffffed002e23efc5 R11: 0000000000000003 R12: 000000000000000c R13: 0000000000000008 R14: ffff8801711f7e20 R15: 0000000000000000 FS: 00007f674a888700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000007 CR3: 00000001d9dad000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 Stack: 0000000000000000c ffffffff81b83bf1c 0000000000000010c 0000000000010202c ffff8801711f7d18c 0000000000000018c ffffffff81b83be5c 0000000000000000c ffff8801711f7f58c 00000000fee1deadc fffffffffffffff2c 0000000000000000c Call Trace: [<000000009a1e63b5>] copy_from_user arch/x86/include/asm/uaccess.h:718 [inline] [<000000009a1e63b5>] SYSC_epoll_ctl fs/eventpoll.c:1874 [inline] [<000000009a1e63b5>] SyS_epoll_ctl+0xf4/0x2680 fs/eventpoll.c:1861 [<00000000c6c594a1>] do_syscall_64+0x1ad/0x570 arch/x86/entry/common.c:285 [<00000000af8659e5>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb Code: c00 c48 c83 cc4 c88 ce8 ca1 c01 c00 c00 c48 c89 ce7 c48 c8b c74 c24 c78 c48 cc7 c44 c24 c78 cff cff cff cff ce8 c6b cf2 c89 cfe ce9 c56 c02 c00 c00 c66 c0f c1f c44 c00 c00 c<66> c0f c1f c44 c00 c00 c48 c83 cc4 c88 ce8 c71 c01 c00 c00 c48 c89 ce7 c48 c8b c74 c