[ 40.008014][ T26] audit: type=1800 audit(1548974554.879:25): pid=7705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 40.034555][ T26] audit: type=1800 audit(1548974554.889:26): pid=7705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 40.055067][ T26] audit: type=1800 audit(1548974554.889:27): pid=7705 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] startpar: service(s) returned failure: rsyslog ...[?25l[?1c7[FAIL8[?25h[?0c failed! Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.150' (ECDSA) to the list of known hosts. 2019/01/31 22:42:43 fuzzer started 2019/01/31 22:42:45 dialing manager at 10.128.0.26:36349 2019/01/31 22:42:46 syscalls: 1 2019/01/31 22:42:46 code coverage: enabled 2019/01/31 22:42:46 comparison tracing: enabled 2019/01/31 22:42:46 extra coverage: extra coverage is not supported by the kernel 2019/01/31 22:42:46 setuid sandbox: enabled 2019/01/31 22:42:46 namespace sandbox: enabled 2019/01/31 22:42:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/01/31 22:42:46 fault injection: enabled 2019/01/31 22:42:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/01/31 22:42:46 net packet injection: enabled 2019/01/31 22:42:46 net device setup: enabled 22:45:37 executing program 0: syzkaller login: [ 223.033901][ T7894] IPVS: ftp: loaded support on port[0] = 21 22:45:38 executing program 1: [ 223.186841][ T7894] chnl_net:caif_netlink_parms(): no params data found [ 223.265910][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.275021][ T7894] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.290151][ T7894] device bridge_slave_0 entered promiscuous mode [ 223.307449][ T7897] IPVS: ftp: loaded support on port[0] = 21 22:45:38 executing program 2: [ 223.314587][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.321735][ T7894] bridge0: port 2(bridge_slave_1) entered disabled state [ 223.336078][ T7894] device bridge_slave_1 entered promiscuous mode [ 223.398387][ T7894] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 223.443208][ T7894] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 223.505216][ T7894] team0: Port device team_slave_0 added [ 223.559890][ T7894] team0: Port device team_slave_1 added [ 223.594124][ T7899] IPVS: ftp: loaded support on port[0] = 21 22:45:38 executing program 3: [ 223.615211][ T7897] chnl_net:caif_netlink_parms(): no params data found 22:45:38 executing program 4: [ 223.753592][ T7894] device hsr_slave_0 entered promiscuous mode [ 223.852077][ T7894] device hsr_slave_1 entered promiscuous mode 22:45:38 executing program 5: [ 223.930081][ T7894] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.937257][ T7894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.944952][ T7894] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.952030][ T7894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.988691][ T7904] IPVS: ftp: loaded support on port[0] = 21 [ 224.009664][ T7902] IPVS: ftp: loaded support on port[0] = 21 [ 224.123727][ T7897] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.131145][ T7897] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.138712][ T7897] device bridge_slave_0 entered promiscuous mode [ 224.146484][ T7897] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.153626][ T7897] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.161896][ T7897] device bridge_slave_1 entered promiscuous mode [ 224.179457][ T7907] IPVS: ftp: loaded support on port[0] = 21 [ 224.206769][ T7897] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.228036][ T7906] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.246620][ T7906] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.258127][ T7897] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 224.304264][ T7894] 8021q: adding VLAN 0 to HW filter on device bond0 [ 224.325718][ T7897] team0: Port device team_slave_0 added [ 224.362671][ T7897] team0: Port device team_slave_1 added [ 224.373160][ T7894] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.384700][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.393176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.532153][ T7897] device hsr_slave_0 entered promiscuous mode [ 224.591046][ T7897] device hsr_slave_1 entered promiscuous mode [ 224.677019][ T7899] chnl_net:caif_netlink_parms(): no params data found [ 224.686468][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.695177][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.703570][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.710662][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.719280][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.728440][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.736684][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.743709][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.751253][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 224.777190][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 224.795208][ T7902] chnl_net:caif_netlink_parms(): no params data found [ 224.853572][ T7907] chnl_net:caif_netlink_parms(): no params data found [ 224.873245][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 224.882548][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 224.915149][ T7899] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.922346][ T7899] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.930129][ T7899] device bridge_slave_0 entered promiscuous mode [ 224.944962][ T7899] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.952864][ T7899] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.960830][ T7899] device bridge_slave_1 entered promiscuous mode [ 224.967652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 224.975612][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 224.984347][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 224.992683][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 225.001286][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 225.012641][ T7904] chnl_net:caif_netlink_parms(): no params data found [ 225.033210][ T7902] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.040245][ T7902] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.048653][ T7902] device bridge_slave_0 entered promiscuous mode [ 225.064525][ T7902] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.071699][ T7902] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.079283][ T7902] device bridge_slave_1 entered promiscuous mode [ 225.130351][ T7902] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.142023][ T7902] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.152206][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 225.160333][ T7906] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 225.196078][ T7899] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.206133][ T7899] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.224596][ T7894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 225.247086][ T7907] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.254573][ T7907] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.265233][ T7907] device bridge_slave_0 entered promiscuous mode [ 225.278655][ T7902] team0: Port device team_slave_0 added [ 225.289616][ T7904] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.297779][ T7904] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.306359][ T7904] device bridge_slave_0 entered promiscuous mode [ 225.313781][ T7907] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.321787][ T7907] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.329332][ T7907] device bridge_slave_1 entered promiscuous mode [ 225.356428][ T7894] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 225.366154][ T7902] team0: Port device team_slave_1 added [ 225.372257][ T7904] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.379306][ T7904] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.388076][ T7904] device bridge_slave_1 entered promiscuous mode [ 225.404593][ T7907] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.414433][ T7899] team0: Port device team_slave_0 added [ 225.421740][ T7907] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.461981][ T7899] team0: Port device team_slave_1 added [ 225.513789][ T7902] device hsr_slave_0 entered promiscuous mode [ 225.570767][ T7902] device hsr_slave_1 entered promiscuous mode [ 225.618509][ T7897] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.638747][ T7904] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 225.648243][ T7907] team0: Port device team_slave_0 added [ 225.655568][ T7907] team0: Port device team_slave_1 added 22:45:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000003c0), 0x4) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) [ 225.694555][ T7904] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 225.715977][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 225.724050][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.768078][ T7897] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.833974][ T7899] device hsr_slave_0 entered promiscuous mode [ 225.881812][ T7899] device hsr_slave_1 entered promiscuous mode [ 225.982359][ T7907] device hsr_slave_0 entered promiscuous mode [ 226.020867][ T7907] device hsr_slave_1 entered promiscuous mode 22:45:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x601) r0 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x3ff, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, 0x0, 0x3db) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, 0x0) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(0xffffffffffffffff, 0x80045300, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) [ 226.078006][ T7904] team0: Port device team_slave_0 added [ 226.089075][ T7904] team0: Port device team_slave_1 added [ 226.104467][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 226.123161][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 226.131795][ T3472] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.138838][ T3472] bridge0: port 1(bridge_slave_0) entered forwarding state [ 226.146715][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 226.155949][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 226.164837][ T3472] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.171925][ T3472] bridge0: port 2(bridge_slave_1) entered forwarding state [ 226.179968][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 226.199115][ T7897] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 226.209743][ T7897] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 226.241093][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 226.249682][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 226.261244][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 226.261877][ T7928] kasan: CONFIG_KASAN_INLINE enabled [ 226.269997][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.283282][ T7928] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 226.283289][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.283966][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.296427][ T7928] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 226.299939][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.307179][ T7928] CPU: 0 PID: 7928 Comm: syz-executor0 Not tainted 5.0.0-rc4-next-20190131 #23 [ 226.307202][ T7928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.307223][ T7928] RIP: 0010:relay_open_buf.part.0+0x7cb/0xb40 [ 226.307236][ T7928] Code: c1 ea 03 80 3c 02 00 0f 85 4c 03 00 00 49 8d 7d 58 4d 89 ac 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 1b 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 226.307244][ T7928] RSP: 0018:ffff88805bfff8b0 EFLAGS: 00010203 [ 226.307255][ T7928] RAX: dffffc0000000000 RBX: ffff8880a3a2ba80 RCX: ffffc900061f5000 [ 226.307269][ T7928] RDX: 0000000000000008 RSI: ffffffff8170edb0 RDI: 0000000000000047 [ 226.314689][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.321963][ T7928] RBP: ffff88805bfff928 R08: ffff88805bfee280 R09: ffff88805bfeeb48 [ 226.321972][ T7928] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a16237c0 [ 226.321981][ T7928] R13: ffffffffffffffef R14: 0000000000000000 R15: 0000000000000004 [ 226.321992][ T7928] FS: 00007f1284dbf700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 226.322008][ T7928] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 226.331661][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.340965][ T7928] CR2: 00007f1284d9ddb8 CR3: 00000000a13fb000 CR4: 00000000001406f0 [ 226.340977][ T7928] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 226.340986][ T7928] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 226.340991][ T7928] Call Trace: [ 226.341009][ T7928] ? kmem_cache_alloc_trace+0x354/0x760 [ 226.341029][ T7928] relay_open+0x523/0x980 [ 226.347574][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.366678][ T7928] do_blk_trace_setup+0x414/0xb90 [ 226.366696][ T7928] __blk_trace_setup+0xe3/0x190 [ 226.366714][ T7928] ? do_blk_trace_setup+0xb90/0xb90 [ 226.373330][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.380717][ T7928] ? disk_name+0xae/0x110 [ 226.380735][ T7928] blk_trace_ioctl+0x170/0x300 [ 226.380754][ T7928] ? blk_add_trace_rq_remap+0x4d0/0x4d0 [ 226.389346][ T3472] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.396439][ T7928] blkdev_ioctl+0x12c/0x1c40 [ 226.396456][ T7928] ? blkpg_ioctl+0xa90/0xa90 [ 226.396478][ T7928] ? debug_smp_processor_id+0x1c/0x20 [ 226.546470][ T7928] ? perf_trace_lock_acquire+0xf5/0x580 [ 226.551991][ T7928] ? __fget+0x340/0x540 [ 226.556121][ T7928] ? find_held_lock+0x35/0x130 [ 226.560856][ T7928] ? __fget+0x340/0x540 [ 226.564986][ T7928] block_ioctl+0xee/0x130 [ 226.569303][ T7928] ? blkdev_fallocate+0x410/0x410 [ 226.574340][ T7928] do_vfs_ioctl+0xd6e/0x1390 [ 226.578906][ T7928] ? ioctl_preallocate+0x210/0x210 [ 226.584017][ T7928] ? __fget+0x367/0x540 [ 226.588353][ T7928] ? ksys_dup3+0x3e0/0x3e0 [ 226.592759][ T7928] ? nsecs_to_jiffies+0x30/0x30 [ 226.597582][ T7928] ? security_file_ioctl+0x93/0xc0 [ 226.602708][ T7928] ksys_ioctl+0xab/0xd0 [ 226.606841][ T7928] __x64_sys_ioctl+0x73/0xb0 [ 226.611421][ T7928] do_syscall_64+0x103/0x610 [ 226.615985][ T7928] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.621847][ T7928] RIP: 0033:0x457e39 [ 226.625712][ T7928] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.645290][ T7928] RSP: 002b:00007f1284dbec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 226.653696][ T7928] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 226.661641][ T7928] RDX: 0000000020000340 RSI: 00000000c0481273 RDI: 000000000000000e [ 226.669584][ T7928] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 226.677528][ T7928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f1284dbf6d4 [ 226.685475][ T7928] R13: 00000000004bf2e7 R14: 00000000004d0bd8 R15: 00000000ffffffff [ 226.693424][ T7928] Modules linked in: [ 226.710228][ T7904] kobject: 'veth0_to_hsr' (00000000e73b25be): kobject_add_internal: parent: 'net', set: 'devices' [ 226.711678][ T7928] ---[ end trace 38df5d7d727978e6 ]--- [ 226.727156][ T7904] kobject: 'veth0_to_hsr' (00000000e73b25be): kobject_uevent_env [ 226.728530][ T7928] RIP: 0010:relay_open_buf.part.0+0x7cb/0xb40 [ 226.735248][ T7904] kobject: 'veth0_to_hsr' (00000000e73b25be): fill_kobj_path: path = '/devices/virtual/net/veth0_to_hsr' [ 226.735333][ T7904] kobject: 'queues' (00000000d186a41d): kobject_add_internal: parent: 'veth0_to_hsr', set: '' [ 226.735356][ T7904] kobject: 'queues' (00000000d186a41d): kobject_uevent_env [ 226.735364][ T7904] kobject: 'queues' (00000000d186a41d): kobject_uevent_env: filter function caused the event to drop! [ 226.735385][ T7904] kobject: 'rx-0' (00000000fb9e6270): kobject_add_internal: parent: 'queues', set: 'queues' [ 226.735434][ T7904] kobject: 'rx-0' (00000000fb9e6270): kobject_uevent_env [ 226.735493][ T7904] kobject: 'rx-0' (00000000fb9e6270): fill_kobj_path: path = '/devices/virtual/net/veth0_to_hsr/queues/rx-0' [ 226.735610][ T7904] kobject: 'tx-0' (00000000327a6d5d): kobject_add_internal: parent: 'queues', set: 'queues' [ 226.735754][ T7904] kobject: 'tx-0' (00000000327a6d5d): kobject_uevent_env [ 226.735783][ T7904] kobject: 'tx-0' (00000000327a6d5d): fill_kobj_path: path = '/devices/virtual/net/veth0_to_hsr/queues/tx-0' [ 226.736437][ T7904] kobject: 'batman_adv' (000000003cc5d674): kobject_add_internal: parent: 'veth0_to_hsr', set: '' [ 226.736764][ T7904] kobject: 'hsr_slave_0' (000000003f70ea4a): kobject_add_internal: parent: 'net', set: 'devices' [ 226.737451][ T7904] kobject: 'hsr_slave_0' (000000003f70ea4a): kobject_uevent_env [ 226.754050][ T7928] Code: c1 ea 03 80 3c 02 00 0f 85 4c 03 00 00 49 8d 7d 58 4d 89 ac 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 1b 03 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 226.760628][ T7904] kobject: 'hsr_slave_0' (000000003f70ea4a): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_0' [ 226.765993][ T7928] RSP: 0018:ffff88805bfff8b0 EFLAGS: 00010203 [ 226.774508][ T7904] kobject: 'queues' (00000000bad77995): kobject_add_internal: parent: 'hsr_slave_0', set: '' [ 226.783632][ T7928] RAX: dffffc0000000000 RBX: ffff8880a3a2ba80 RCX: ffffc900061f5000 [ 226.793361][ T7904] kobject: 'queues' (00000000bad77995): kobject_uevent_env [ 226.793371][ T7904] kobject: 'queues' (00000000bad77995): kobject_uevent_env: filter function caused the event to drop! [ 226.793393][ T7904] kobject: 'rx-0' (0000000091b8a4c9): kobject_add_internal: parent: 'queues', set: 'queues' [ 226.802952][ T7928] RDX: 0000000000000008 RSI: ffffffff8170edb0 RDI: 0000000000000047 [ 226.814929][ T7904] kobject: 'rx-0' (0000000091b8a4c9): kobject_uevent_env [ 226.822590][ T7928] RBP: ffff88805bfff928 R08: ffff88805bfee280 R09: ffff88805bfeeb48 [ 226.829751][ T7904] kobject: 'rx-0' (0000000091b8a4c9): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_0/queues/rx-0' [ 226.841282][ T7928] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a16237c0 [ 226.855317][ T7904] kobject: 'tx-0' (000000009e228821): kobject_add_internal: parent: 'queues', set: 'queues' [ 226.862810][ T7928] R13: ffffffffffffffef R14: 0000000000000000 R15: 0000000000000004 [ 226.872779][ T7904] kobject: 'tx-0' (000000009e228821): kobject_uevent_env [ 226.890313][ T7928] FS: 00007f1284dbf700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 226.903464][ T7904] kobject: 'tx-0' (000000009e228821): fill_kobj_path: path = '/devices/virtual/net/hsr_slave_0/queues/tx-0' [ 226.907215][ T7928] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 226.918534][ T7904] kobject: 'batman_adv' (00000000b12dc68b): kobject_add_internal: parent: 'hsr_slave_0', set: '' [ 226.926940][ T7928] CR2: 0000000000000004 CR3: 00000000a13fb000 CR4: 00000000001406e0 [ 226.975799][ T7907] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.030594][ T7928] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 227.063670][ T7899] 8021q: adding VLAN 0 to HW filter on device bond0 [ 227.089586][ T7928] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 227.100500][ T7928] Kernel panic - not syncing: Fatal exception [ 227.102383][ T7897] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 227.114348][ T7928] Kernel Offset: disabled [ 227.118662][ T7928] Rebooting in 86400 seconds..