[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 114.125814] audit: type=1800 audit(1556238515.184:25): pid=10518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 114.150697] audit: type=1800 audit(1556238515.204:26): pid=10518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 114.189345] audit: type=1800 audit(1556238515.234:27): pid=10518 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.244' (ECDSA) to the list of known hosts. 2019/04/26 00:28:50 fuzzer started 2019/04/26 00:28:56 dialing manager at 10.128.0.26:40967 2019/04/26 00:28:57 syscalls: 2284 2019/04/26 00:28:57 code coverage: enabled 2019/04/26 00:28:57 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/04/26 00:28:57 extra coverage: extra coverage is not supported by the kernel 2019/04/26 00:28:57 setuid sandbox: enabled 2019/04/26 00:28:57 namespace sandbox: enabled 2019/04/26 00:28:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/26 00:28:57 fault injection: enabled 2019/04/26 00:28:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/26 00:28:57 net packet injection: enabled 2019/04/26 00:28:57 net device setup: enabled 00:32:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000200)='./bus\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f0000000280)=@sha1={0x1, "253ce9ff2f8c962519f5ec6cc1803fdbf1461b7f"}, 0x15, 0x0) setxattr$security_capability(&(0x7f00000002c0)='./bus\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000140)=@v2, 0x14, 0x0) write$eventfd(r1, &(0x7f0000000180), 0xfffffe34) syzkaller login: [ 376.937040] IPVS: ftp: loaded support on port[0] = 21 [ 377.118263] chnl_net:caif_netlink_parms(): no params data found [ 377.199383] bridge0: port 1(bridge_slave_0) entered blocking state [ 377.206407] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.215605] device bridge_slave_0 entered promiscuous mode [ 377.226078] bridge0: port 2(bridge_slave_1) entered blocking state [ 377.232835] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.241546] device bridge_slave_1 entered promiscuous mode [ 377.279090] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 377.291654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 377.329843] team0: Port device team_slave_0 added [ 377.339568] team0: Port device team_slave_1 added [ 377.571896] device hsr_slave_0 entered promiscuous mode [ 377.802745] device hsr_slave_1 entered promiscuous mode [ 378.057154] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.063975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.071368] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.078316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.095721] bridge0: port 1(bridge_slave_0) entered disabled state [ 378.105237] bridge0: port 2(bridge_slave_1) entered disabled state [ 378.202775] 8021q: adding VLAN 0 to HW filter on device bond0 [ 378.226941] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 378.235716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.252439] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.268100] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 378.278423] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.287221] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.294117] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.350965] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 378.360949] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 378.377427] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 378.386625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.395253] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.402091] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.410389] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 378.420156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 378.429982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 378.439411] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 378.448666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 378.458040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 378.467287] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 378.476023] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.485265] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 378.494104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.510279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 378.518896] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 378.559571] 8021q: adding VLAN 0 to HW filter on device batadv0 00:33:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:33:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:33:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000c40)=""/23, 0x17}], 0x1, 0x0, 0x0, 0x8}}], 0x1, 0x0, 0x0) sched_setaffinity(0x0, 0x181, &(0x7f0000000180)=0x9) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/route\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 00:33:00 executing program 0: perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f000000a000)) [ 379.984219] ================================================================== [ 379.992516] BUG: KMSAN: uninit-value in ip6_compressed_string+0x1de/0x1490 [ 379.999907] CPU: 0 PID: 10704 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #1 [ 380.007316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.018405] Call Trace: [ 380.021063] dump_stack+0x173/0x1d0 [ 380.024817] kmsan_report+0x131/0x2a0 [ 380.028855] __msan_warning+0x7a/0xf0 [ 380.032712] ip6_compressed_string+0x1de/0x1490 [ 380.037580] ? __msan_poison_alloca+0x1e0/0x290 [ 380.042304] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.047719] ip6_addr_string+0x165/0x2b0 [ 380.052199] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.057809] ? vsnprintf+0x1c24/0x3230 [ 380.062134] pointer+0x10f2/0x1660 [ 380.065735] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.071067] vsnprintf+0x1c24/0x3230 [ 380.075038] snprintf+0x246/0x290 [ 380.078685] ? depot_save_stack+0x388/0x4a0 [ 380.083188] ? rpcb_getport_async+0xfbe/0x1790 [ 380.087822] rpc_sockaddr2uaddr+0x4ec/0x730 [ 380.092479] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.097722] rpcb_getport_async+0xfbe/0x1790 [ 380.102248] ? _raw_spin_unlock_bh+0x4b/0x60 [ 380.106706] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.112033] ? rpcb_v4_register+0xcd0/0xcd0 [ 380.116581] call_encode+0xba0/0x1650 [ 380.120444] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.125912] call_allocate+0x1a5/0x920 [ 380.129872] call_refreshresult+0x15d/0x580 [ 380.134259] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.139519] call_reserveresult+0x6b8/0x740 [ 380.143928] call_start+0x73c/0x790 [ 380.147784] ? rpc_prepare_reply_pages+0x3b0/0x3b0 [ 380.152765] __rpc_execute+0x968/0x1610 [ 380.157070] ? rpc_prepare_reply_pages+0x3b0/0x3b0 [ 380.162293] rpc_execute+0x437/0x6d0 [ 380.166066] rpc_run_task+0x8b8/0xbb0 [ 380.169932] rpc_create_xprt+0x5a3/0xd50 [ 380.174050] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.179417] rpc_create+0xaa6/0xb30 [ 380.183128] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.188407] nfs_create_rpc_client+0x723/0x920 [ 380.193512] nfs_init_client+0xb8/0x1d0 [ 380.197824] ? nfs_init_server_rpcclient+0x430/0x430 [ 380.202977] nfs_get_client+0x1487/0x16a0 [ 380.207360] ? kmem_cache_alloc_trace+0x55d/0xb50 [ 380.212350] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 380.217793] nfs_create_server+0xb9a/0x3550 [ 380.222228] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.227454] ? nfs_fs_mount+0x36b2/0x3a70 [ 380.231647] nfs_try_mount+0x1134/0x1550 [ 380.235845] ? __msan_poison_alloca+0x1e0/0x290 [ 380.240595] ? try_module_get+0x5f/0x3f0 [ 380.244689] ? get_nfs_version+0x4c2/0x550 [ 380.248970] ? try_module_get+0x5f/0x3f0 [ 380.253168] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.258654] ? _raw_spin_lock+0x92/0x110 [ 380.262838] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.268075] ? get_nfs_version+0x4c2/0x550 [ 380.272436] nfs_fs_mount+0x36b2/0x3a70 [ 380.276468] ? nfs_auth_info_match+0x190/0x190 [ 380.281077] ? nfs_free_parsed_mount_data+0x1e0/0x1e0 [ 380.286386] ? nfs_fill_super+0xbf0/0xbf0 [ 380.290598] legacy_get_tree+0x163/0x2d0 [ 380.294691] ? init_once+0x570/0x570 [ 380.298450] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 380.303466] vfs_get_tree+0x1ae/0x810 [ 380.307323] do_mount+0x31d4/0x65f0 [ 380.311025] ksys_mount+0x32e/0x3d0 [ 380.314702] __se_sys_mount+0xe5/0x110 [ 380.318839] __x64_sys_mount+0x62/0x80 [ 380.322787] do_syscall_64+0xbc/0xf0 [ 380.326634] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 380.332271] RIP: 0033:0x458da9 [ 380.335487] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.354852] RSP: 002b:00007ffb8e483c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 380.362874] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458da9 [ 380.370269] RDX: 000000002015bffc RSI: 0000000020343ff8 RDI: 0000000000000000 [ 380.377929] RBP: 000000000073bf00 R08: 000000002000a000 R09: 0000000000000000 [ 380.385755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8e4846d4 [ 380.393510] R13: 00000000004c4da1 R14: 00000000004d8a08 R15: 00000000ffffffff [ 380.401097] [ 380.402795] Uninit was stored to memory at: [ 380.407466] kmsan_internal_chain_origin+0x134/0x230 [ 380.412615] kmsan_memcpy_memmove_metadata+0x989/0xd60 [ 380.418025] kmsan_memcpy_metadata+0xb/0x10 [ 380.422399] __msan_memcpy+0x58/0x70 [ 380.426171] ip6_compressed_string+0xbe/0x1490 [ 380.430783] ip6_addr_string+0x165/0x2b0 [ 380.434868] pointer+0x10f2/0x1660 [ 380.438430] vsnprintf+0x1c24/0x3230 [ 380.442186] snprintf+0x246/0x290 [ 380.445771] rpc_sockaddr2uaddr+0x4ec/0x730 [ 380.450175] rpcb_getport_async+0xfbe/0x1790 [ 380.454700] call_encode+0xba0/0x1650 [ 380.458610] call_allocate+0x1a5/0x920 [ 380.462701] call_refreshresult+0x15d/0x580 [ 380.467047] call_reserveresult+0x6b8/0x740 [ 380.471397] call_start+0x73c/0x790 [ 380.475046] __rpc_execute+0x968/0x1610 [ 380.479050] rpc_execute+0x437/0x6d0 [ 380.482792] rpc_run_task+0x8b8/0xbb0 [ 380.486717] rpc_create_xprt+0x5a3/0xd50 [ 380.490992] rpc_create+0xaa6/0xb30 [ 380.494752] nfs_create_rpc_client+0x723/0x920 [ 380.499462] nfs_init_client+0xb8/0x1d0 [ 380.503509] nfs_get_client+0x1487/0x16a0 [ 380.507714] nfs_create_server+0xb9a/0x3550 [ 380.512217] nfs_try_mount+0x1134/0x1550 [ 380.516319] nfs_fs_mount+0x36b2/0x3a70 [ 380.520370] legacy_get_tree+0x163/0x2d0 [ 380.524748] vfs_get_tree+0x1ae/0x810 [ 380.528579] do_mount+0x31d4/0x65f0 [ 380.532239] ksys_mount+0x32e/0x3d0 [ 380.535925] __se_sys_mount+0xe5/0x110 [ 380.543951] __x64_sys_mount+0x62/0x80 [ 380.547871] do_syscall_64+0xbc/0xf0 [ 380.551636] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 380.556930] [ 380.558576] Local variable description: ----addr@rpcb_getport_async [ 380.565115] Variable was created at: [ 380.568855] rpcb_getport_async+0xb3/0x1790 [ 380.573332] call_encode+0xba0/0x1650 [ 380.577313] ================================================================== [ 380.584796] Disabling lock debugging due to kernel taint [ 380.590272] Kernel panic - not syncing: panic_on_warn set ... [ 380.596198] CPU: 0 PID: 10704 Comm: syz-executor.0 Tainted: G B 5.1.0-rc4+ #1 [ 380.604799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 380.614790] Call Trace: [ 380.617511] dump_stack+0x173/0x1d0 [ 380.621298] panic+0x3d1/0xb01 [ 380.624570] kmsan_report+0x29a/0x2a0 [ 380.628424] __msan_warning+0x7a/0xf0 [ 380.632372] ip6_compressed_string+0x1de/0x1490 [ 380.637177] ? __msan_poison_alloca+0x1e0/0x290 [ 380.641985] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.647224] ip6_addr_string+0x165/0x2b0 [ 380.651429] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.656643] ? vsnprintf+0x1c24/0x3230 [ 380.660565] pointer+0x10f2/0x1660 [ 380.664158] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.669393] vsnprintf+0x1c24/0x3230 [ 380.673178] snprintf+0x246/0x290 [ 380.676856] ? depot_save_stack+0x388/0x4a0 [ 380.681377] ? rpcb_getport_async+0xfbe/0x1790 [ 380.686104] rpc_sockaddr2uaddr+0x4ec/0x730 [ 380.690663] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.695910] rpcb_getport_async+0xfbe/0x1790 [ 380.700435] ? _raw_spin_unlock_bh+0x4b/0x60 [ 380.704979] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.710401] ? rpcb_v4_register+0xcd0/0xcd0 [ 380.714856] call_encode+0xba0/0x1650 [ 380.719263] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.724502] call_allocate+0x1a5/0x920 [ 380.728557] call_refreshresult+0x15d/0x580 [ 380.732938] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.738272] call_reserveresult+0x6b8/0x740 [ 380.742739] call_start+0x73c/0x790 [ 380.746512] ? rpc_prepare_reply_pages+0x3b0/0x3b0 [ 380.751755] __rpc_execute+0x968/0x1610 [ 380.756132] ? rpc_prepare_reply_pages+0x3b0/0x3b0 [ 380.761125] rpc_execute+0x437/0x6d0 [ 380.765103] rpc_run_task+0x8b8/0xbb0 [ 380.768960] rpc_create_xprt+0x5a3/0xd50 [ 380.773049] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.778568] rpc_create+0xaa6/0xb30 [ 380.782346] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.787582] nfs_create_rpc_client+0x723/0x920 [ 380.792325] nfs_init_client+0xb8/0x1d0 [ 380.796449] ? nfs_init_server_rpcclient+0x430/0x430 [ 380.801576] nfs_get_client+0x1487/0x16a0 [ 380.805886] ? kmem_cache_alloc_trace+0x55d/0xb50 [ 380.810775] ? kmsan_internal_memset_shadow+0x104/0x3a0 [ 380.816300] nfs_create_server+0xb9a/0x3550 [ 380.820708] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.825931] ? nfs_fs_mount+0x36b2/0x3a70 [ 380.830112] nfs_try_mount+0x1134/0x1550 [ 380.834469] ? __msan_poison_alloca+0x1e0/0x290 [ 380.839177] ? try_module_get+0x5f/0x3f0 [ 380.843268] ? get_nfs_version+0x4c2/0x550 [ 380.847624] ? try_module_get+0x5f/0x3f0 [ 380.851706] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.856931] ? _raw_spin_lock+0x92/0x110 [ 380.861038] ? kmsan_get_shadow_origin_ptr+0x73/0x480 [ 380.866265] ? get_nfs_version+0x4c2/0x550 [ 380.870544] nfs_fs_mount+0x36b2/0x3a70 [ 380.874748] ? nfs_auth_info_match+0x190/0x190 [ 380.879363] ? nfs_free_parsed_mount_data+0x1e0/0x1e0 [ 380.884584] ? nfs_fill_super+0xbf0/0xbf0 [ 380.888787] legacy_get_tree+0x163/0x2d0 [ 380.893394] ? init_once+0x570/0x570 [ 380.897254] ? legacy_parse_monolithic+0x2c0/0x2c0 [ 380.902230] vfs_get_tree+0x1ae/0x810 [ 380.906075] do_mount+0x31d4/0x65f0 [ 380.909770] ksys_mount+0x32e/0x3d0 [ 380.913491] __se_sys_mount+0xe5/0x110 [ 380.917426] __x64_sys_mount+0x62/0x80 [ 380.921406] do_syscall_64+0xbc/0xf0 [ 380.925154] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 380.930388] RIP: 0033:0x458da9 [ 380.933605] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 380.952719] RSP: 002b:00007ffb8e483c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 380.960457] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000458da9 [ 380.967750] RDX: 000000002015bffc RSI: 0000000020343ff8 RDI: 0000000000000000 [ 380.975043] RBP: 000000000073bf00 R08: 000000002000a000 R09: 0000000000000000 [ 380.982501] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffb8e4846d4 [ 380.989784] R13: 00000000004c4da1 R14: 00000000004d8a08 R15: 00000000ffffffff [ 380.999024] Kernel Offset: disabled [ 381.002714] Rebooting in 86400 seconds..