[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 96.710972] audit: type=1800 audit(1551688192.756:25): pid=10850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 96.730144] audit: type=1800 audit(1551688192.756:26): pid=10850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 96.749661] audit: type=1800 audit(1551688192.786:27): pid=10850 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.189' (ECDSA) to the list of known hosts. 2019/03/04 08:30:07 fuzzer started 2019/03/04 08:30:13 dialing manager at 10.128.0.26:34023 2019/03/04 08:30:13 syscalls: 1 2019/03/04 08:30:13 code coverage: enabled 2019/03/04 08:30:13 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/04 08:30:13 extra coverage: extra coverage is not supported by the kernel 2019/03/04 08:30:13 setuid sandbox: enabled 2019/03/04 08:30:13 namespace sandbox: enabled 2019/03/04 08:30:13 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/04 08:30:13 fault injection: enabled 2019/03/04 08:30:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/04 08:30:13 net packet injection: enabled 2019/03/04 08:30:13 net device setup: enabled 08:33:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'nr0\x01\x00', 0x2302}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, 0x0) syzkaller login: [ 290.835805] IPVS: ftp: loaded support on port[0] = 21 [ 291.014152] chnl_net:caif_netlink_parms(): no params data found [ 291.093582] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.100148] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.108932] device bridge_slave_0 entered promiscuous mode [ 291.118153] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.124848] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.133616] device bridge_slave_1 entered promiscuous mode [ 291.170074] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 291.182102] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 291.214694] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 291.223535] team0: Port device team_slave_0 added [ 291.230182] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 291.239004] team0: Port device team_slave_1 added [ 291.245458] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 291.254129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 291.447819] device hsr_slave_0 entered promiscuous mode [ 291.703427] device hsr_slave_1 entered promiscuous mode [ 291.903971] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 291.911944] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 291.946159] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.952789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 291.960439] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.967123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.023189] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.032197] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.097605] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.115647] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 292.130664] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 292.137730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 292.146836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.165439] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 292.171578] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.188574] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 292.196548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 292.205918] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.214768] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.221274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.239544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 292.248605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 292.258754] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.267245] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.273813] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.296001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 292.304160] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 292.323980] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 292.331609] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 292.348491] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 292.357365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 292.366879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.383145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 292.393201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 292.401613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 292.411061] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.425701] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 292.441008] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 292.450048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 292.459521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.468453] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 292.477466] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.494161] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 292.500290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.534271] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 292.560520] 8021q: adding VLAN 0 to HW filter on device batadv0 08:33:09 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000001480)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f00000002c0)=""/180, 0xb4}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f0000000440)=""/14, 0xe}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x7, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000001700)=""/222, 0xde}, {&(0x7f0000001800)=""/227, 0xe3}, {&(0x7f0000001900)=""/224, 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) [ 293.157293] ptrace attach of "/root/syz-executor.0"[11026] was attempted by "/root/syz-executor.0"[11027] 08:33:09 executing program 1: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000000)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) close(r0) 08:33:10 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000001480)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f00000002c0)=""/180, 0xb4}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f0000000440)=""/14, 0xe}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x7, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000001700)=""/222, 0xde}, {&(0x7f0000001800)=""/227, 0xe3}, {&(0x7f0000001900)=""/224, 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) [ 294.339704] IPVS: ftp: loaded support on port[0] = 21 [ 294.507287] chnl_net:caif_netlink_parms(): no params data found [ 294.584114] bridge0: port 1(bridge_slave_0) entered blocking state [ 294.590672] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.599561] device bridge_slave_0 entered promiscuous mode [ 294.609949] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.616647] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.625953] device bridge_slave_1 entered promiscuous mode [ 294.664602] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 294.676602] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 294.710188] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 294.719238] team0: Port device team_slave_0 added [ 294.726781] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 294.735936] team0: Port device team_slave_1 added [ 294.742432] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 294.751441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 294.849373] device hsr_slave_0 entered promiscuous mode 08:33:11 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000001480)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f00000002c0)=""/180, 0xb4}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f0000000440)=""/14, 0xe}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x7, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000001700)=""/222, 0xde}, {&(0x7f0000001800)=""/227, 0xe3}, {&(0x7f0000001900)=""/224, 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) [ 294.937065] device hsr_slave_1 entered promiscuous mode [ 295.023604] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 295.031408] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 295.100742] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.107403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.114727] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.121321] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.220307] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 295.226757] 8021q: adding VLAN 0 to HW filter on device bond0 [ 295.243461] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 295.247136] ptrace attach of "/root/syz-executor.0"[11047] was attempted by "/root/syz-executor.0"[11048] [ 295.258111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.274121] bridge0: port 1(bridge_slave_0) entered disabled state [ 295.284843] bridge0: port 2(bridge_slave_1) entered disabled state [ 295.299231] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 295.319722] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 295.326031] 8021q: adding VLAN 0 to HW filter on device team0 [ 295.347184] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.355845] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.362495] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.406694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.415452] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.422071] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.432031] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 295.469640] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 295.479581] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 295.491512] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 295.504265] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 295.513368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 295.524019] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.533093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.545467] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 295.574253] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 295.594502] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 295.740252] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 295.754945] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 08:33:11 executing program 1: clone(0x203102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x4, 0x4d}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x6, 0x0) 08:33:11 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000064c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=[{0xc, 0x84}], 0xc}, 0x9}], 0x1, 0x10000000000000) 08:33:12 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) process_vm_readv(r0, &(0x7f0000001480)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f0000000140)=""/219, 0xdb}, {&(0x7f0000000240)=""/55, 0x37}, {&(0x7f00000002c0)=""/180, 0xb4}, {&(0x7f0000000380)=""/159, 0x9f}, {&(0x7f0000000440)=""/14, 0xe}, {&(0x7f0000000480)=""/4096, 0x1000}], 0x7, &(0x7f0000001a00)=[{0x0}, {&(0x7f0000001700)=""/222, 0xde}, {&(0x7f0000001800)=""/227, 0xe3}, {&(0x7f0000001900)=""/224, 0xe0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) [ 295.908463] ptrace attach of "/root/syz-executor.1"[11058] was attempted by "/root/syz-executor.1"[11059] [ 296.074281] ================================================================== [ 296.081755] BUG: KMSAN: uninit-value in gue_err+0x482/0xb00 [ 296.087490] CPU: 1 PID: 16 Comm: ksoftirqd/1 Not tainted 5.0.0-rc1+ #9 [ 296.094173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.103538] Call Trace: [ 296.106164] dump_stack+0x173/0x1d0 [ 296.109827] kmsan_report+0x12e/0x2a0 [ 296.113672] __msan_warning+0x82/0xf0 [ 296.117503] gue_err+0x482/0xb00 [ 296.120926] ? fou_build_header+0x690/0x690 [ 296.125265] __udp4_lib_err+0x12e6/0x1d40 [ 296.129484] udp_err+0x74/0x90 [ 296.132704] ? __udp4_lib_err+0x1d40/0x1d40 [ 296.137054] icmp_unreach+0xb65/0x1070 [ 296.140995] ? icmp_discard+0x30/0x30 [ 296.144819] icmp_rcv+0x11a1/0x1950 [ 296.148496] ? local_bh_enable+0x40/0x40 [ 296.152583] ip_protocol_deliver_rcu+0x584/0xba0 [ 296.157390] ip_local_deliver+0x624/0x7b0 [ 296.161583] ? ip_local_deliver+0x7b0/0x7b0 [ 296.165931] ? ip_protocol_deliver_rcu+0xba0/0xba0 [ 296.170896] ip_rcv+0x6b6/0x740 [ 296.174215] ? ip_rcv_core+0x11c0/0x11c0 [ 296.178305] process_backlog+0x756/0x10e0 [ 296.182501] ? ip_local_deliver_finish+0x320/0x320 [ 296.187462] ? rps_trigger_softirq+0x2e0/0x2e0 [ 296.192067] net_rx_action+0x78b/0x1a60 [ 296.196095] ? net_tx_action+0xca0/0xca0 [ 296.200179] __do_softirq+0x53f/0x93a [ 296.204018] ? ksoftirqd_should_run+0x30/0x30 [ 296.208536] run_ksoftirqd+0x26/0x50 [ 296.212273] smpboot_thread_fn+0x4d0/0x9f0 [ 296.216556] kthread+0x4a1/0x4e0 [ 296.219946] ? cpu_report_death+0x190/0x190 [ 296.224285] ? schedule_tail+0x1b2/0x410 [ 296.228384] ? kthread_blkcg+0xf0/0xf0 [ 296.232305] ret_from_fork+0x35/0x40 [ 296.236044] [ 296.237680] Uninit was created at: [ 296.241234] kmsan_internal_poison_shadow+0x92/0x150 [ 296.246362] kmsan_kmalloc+0xa6/0x130 [ 296.250181] kmsan_slab_alloc+0xe/0x10 [ 296.254087] __kmalloc_node_track_caller+0xe9e/0xff0 [ 296.259207] __alloc_skb+0x309/0xa20 [ 296.262945] alloc_skb_with_frags+0x1c7/0xac0 [ 296.267458] sock_alloc_send_pskb+0xafd/0x10a0 [ 296.272060] sock_alloc_send_skb+0xca/0xe0 [ 296.276312] __ip_append_data+0x34cd/0x5000 [ 296.280661] ip_append_data+0x324/0x480 [ 296.284649] icmp_push_reply+0x23d/0x7e0 [ 296.288724] icmp_send+0x2e74/0x30c0 [ 296.292449] __udp4_lib_rcv+0x36c9/0x4b70 [ 296.296606] udp_rcv+0x5c/0x70 [ 296.299810] ip_protocol_deliver_rcu+0x584/0xba0 [ 296.304585] ip_local_deliver+0x624/0x7b0 [ 296.308742] ip_rcv+0x6b6/0x740 [ 296.312034] process_backlog+0x756/0x10e0 [ 296.316191] net_rx_action+0x78b/0x1a60 [ 296.320185] __do_softirq+0x53f/0x93a [ 296.323987] ================================================================== [ 296.331360] Disabling lock debugging due to kernel taint [ 296.336817] Kernel panic - not syncing: panic_on_warn set ... [ 296.342735] CPU: 1 PID: 16 Comm: ksoftirqd/1 Tainted: G B 5.0.0-rc1+ #9 [ 296.350798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.360163] Call Trace: [ 296.362794] dump_stack+0x173/0x1d0 [ 296.366464] panic+0x3d1/0xb01 [ 296.369725] kmsan_report+0x293/0x2a0 [ 296.373565] __msan_warning+0x82/0xf0 [ 296.377406] gue_err+0x482/0xb00 [ 296.380849] ? fou_build_header+0x690/0x690 [ 296.385198] __udp4_lib_err+0x12e6/0x1d40 [ 296.389433] udp_err+0x74/0x90 [ 296.392653] ? __udp4_lib_err+0x1d40/0x1d40 [ 296.396996] icmp_unreach+0xb65/0x1070 [ 296.400931] ? icmp_discard+0x30/0x30 [ 296.404756] icmp_rcv+0x11a1/0x1950 [ 296.408431] ? local_bh_enable+0x40/0x40 [ 296.412519] ip_protocol_deliver_rcu+0x584/0xba0 [ 296.417320] ip_local_deliver+0x624/0x7b0 [ 296.421527] ? ip_local_deliver+0x7b0/0x7b0 [ 296.425877] ? ip_protocol_deliver_rcu+0xba0/0xba0 [ 296.430826] ip_rcv+0x6b6/0x740 [ 296.434161] ? ip_rcv_core+0x11c0/0x11c0 [ 296.438246] process_backlog+0x756/0x10e0 [ 296.442436] ? ip_local_deliver_finish+0x320/0x320 [ 296.447410] ? rps_trigger_softirq+0x2e0/0x2e0 [ 296.452011] net_rx_action+0x78b/0x1a60 [ 296.456045] ? net_tx_action+0xca0/0xca0 [ 296.460154] __do_softirq+0x53f/0x93a [ 296.463997] ? ksoftirqd_should_run+0x30/0x30 [ 296.468515] run_ksoftirqd+0x26/0x50 [ 296.472257] smpboot_thread_fn+0x4d0/0x9f0 [ 296.476533] kthread+0x4a1/0x4e0 [ 296.479925] ? cpu_report_death+0x190/0x190 [ 296.484268] ? schedule_tail+0x1b2/0x410 [ 296.488364] ? kthread_blkcg+0xf0/0xf0 [ 296.492278] ret_from_fork+0x35/0x40 [ 296.497015] Kernel Offset: disabled [ 296.500644] Rebooting in 86400 seconds..