OpenBSD Secure S[ 27.086012][ T25] audit: type=1400 audit(1578281367.772:37): avc: denied { watch } for pid=6954 comm="restorecond" path="/root/.ssh" dev="sda1" ino=16179 scontext=system_u:system_r:kernel_t:s0 tcontext=unconfined_u:object_r:ssh_home_t:s0 tclass=dir permissive=1 hell server: sshd[?25l[?1c7[ ok [39[ 27.121261][ T25] audit: type=1400 audit(1578281367.772:38): avc: denied { watch } for pid=6954 comm="restorecond" path="/etc/selinux/restorecond.conf" dev="sda1" ino=2232 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 ;49m8[?25h[?0c. [....] Start[ 27.148317][ T25] audit: type=1800 audit(1578281367.842:39): pid=6862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 ing file context[ 27.170883][ T25] audit: type=1800 audit(1578281367.842:40): pid=6862 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2423 res=0 maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.092060][ T25] audit: type=1400 audit(1578281369.782:41): avc: denied { map } for pid=7031 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.225' (ECDSA) to the list of known hosts. [ 67.071844][ T25] audit: type=1400 audit(1578281407.762:42): avc: denied { map } for pid=7047 comm="syz-executor270" path="/root/syz-executor270750207" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 executing program [ 73.846264][ T7048] IPVS: ftp: loaded support on port[0] = 21 [ 73.857705][ T25] audit: type=1400 audit(1578281414.542:43): avc: denied { create } for pid=7048 comm="syz-executor270" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 73.860604][ T7049] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 73.882589][ T25] audit: type=1400 audit(1578281414.542:44): avc: denied { write } for pid=7048 comm="syz-executor270" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 73.916565][ T25] audit: type=1400 audit(1578281414.542:45): avc: denied { read } for pid=7048 comm="syz-executor270" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 73.949039][ T7049] FAULT_INJECTION: forcing a failure. [ 73.949039][ T7049] name failslab, interval 1, probability 0, space 0, times 1 [ 73.961770][ T7049] CPU: 0 PID: 7049 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 73.970911][ T7049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 73.980998][ T7049] Call Trace: [ 73.984268][ T7049] dump_stack+0xbc/0xe6 [ 73.988405][ T7049] should_fail.cold+0x3c/0x49 [ 73.993060][ T7049] __should_failslab+0x65/0xa0 [ 73.997800][ T7049] should_failslab+0x9/0x14 [ 74.002280][ T7049] kmem_cache_alloc+0x26/0x2c0 [ 74.007040][ T7049] create_object+0x3d/0x360 [ 74.011523][ T7049] kmemleak_alloc+0x21/0x30 [ 74.016016][ T7049] __kmalloc_track_caller+0x165/0x300 [ 74.021519][ T7049] ? kstrdup_const+0x48/0x60 [ 74.026080][ T7049] kstrdup+0x3a/0x70 [ 74.029961][ T7049] kstrdup_const+0x48/0x60 [ 74.034361][ T7049] __kernfs_new_node+0x53/0x280 [ 74.039280][ T7049] ? make_kgid+0x23/0x30 [ 74.043693][ T7049] kernfs_new_node+0x5e/0x90 [ 74.048716][ T7049] kernfs_create_dir_ns+0x52/0xb0 [ 74.053733][ T7049] sysfs_create_dir_ns+0x8a/0x120 [ 74.058944][ T7049] kobject_add_internal+0x103/0x350 [ 74.064116][ T7049] kobject_add+0x9e/0xe0 [ 74.068338][ T7049] ? _raw_spin_unlock+0x1f/0x40 [ 74.073178][ T7049] ? get_device_parent.isra.0+0x108/0x240 [ 74.078891][ T7049] device_add+0x19d/0xa60 [ 74.083233][ T7049] netdev_register_kobject+0xa6/0x1b0 [ 74.088757][ T7049] register_netdevice+0x1ce/0x650 [ 74.094065][ T7049] hsr_dev_finalize+0x18a/0x237 [ 74.099087][ T7049] hsr_newlink+0xf3/0x140 [ 74.103400][ T7049] ? hsr_fill_info+0x180/0x180 [ 74.108138][ T7049] __rtnl_newlink+0x89a/0xb80 [ 74.112894][ T7049] ? is_bpf_text_address+0x24/0x30 [ 74.117983][ T7049] ? kernel_text_address+0x45/0xb0 [ 74.123068][ T7049] ? full_name_hash+0x98/0xe0 [ 74.127736][ T7049] ? tomoyo_merge_path_acl+0x39/0x60 [ 74.133095][ T7049] ? tomoyo_same_path_acl+0x60/0x60 [ 74.138263][ T7049] ? tomoyo_update_domain+0x9f/0x1f0 [ 74.143536][ T7049] ? debug_smp_processor_id+0x27/0xad [ 74.148937][ T7049] ? rcu_is_watching+0x11/0x50 [ 74.153678][ T7049] ? bpf_prog_kallsyms_find+0xee/0x120 [ 74.159130][ T7049] ? __rtnl_newlink+0xb80/0xb80 [ 74.163956][ T7049] rtnl_newlink+0x4e/0x80 [ 74.168256][ T7049] rtnetlink_rcv_msg+0x178/0x4b0 [ 74.173165][ T7049] ? rtnl_calcit.isra.0+0x170/0x170 [ 74.178333][ T7049] netlink_rcv_skb+0x61/0x170 [ 74.182982][ T7049] rtnetlink_rcv+0x1d/0x30 [ 74.187379][ T7049] netlink_unicast+0x223/0x310 [ 74.192119][ T7049] netlink_sendmsg+0x2c0/0x570 [ 74.196879][ T7049] sock_sendmsg+0x54/0x70 [ 74.201192][ T7049] ____sys_sendmsg+0x2d0/0x300 [ 74.205955][ T7049] ___sys_sendmsg+0x8a/0xd0 [ 74.210438][ T7049] ? kstrtouint+0x76/0xa0 [ 74.214767][ T7049] ? kstrtouint_from_user+0x7f/0xb0 [ 74.219962][ T7049] ? __fget_light+0x70/0xb0 [ 74.224436][ T7049] ? __fdget+0x1b/0x20 [ 74.228565][ T7049] ? sockfd_lookup_light+0x6c/0xb0 [ 74.233654][ T7049] __sys_sendmsg+0x80/0xf0 [ 74.238076][ T7049] __x64_sys_sendmsg+0x23/0x30 [ 74.242822][ T7049] do_syscall_64+0x73/0x220 [ 74.247484][ T7049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 74.253439][ T7049] RIP: 0033:0x442299 [ 74.257318][ T7049] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 74.276908][ T7049] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 74.285297][ T7049] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 74.293241][ T7049] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 74.301382][ T7049] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 74.309325][ T7049] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 74.317268][ T7049] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 74.326310][ T7049] device veth1 entered promiscuous mode [ 74.369026][ T7049] tunl0: Cannot use loopback or non-ethernet device as HSR slave. [ 74.408984][ T7049] device veth1 left promiscuous mode executing program [ 80.303514][ T7050] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 80.349029][ T7050] FAULT_INJECTION: forcing a failure. [ 80.349029][ T7050] name failslab, interval 1, probability 0, space 0, times 0 [ 80.361664][ T7050] CPU: 0 PID: 7050 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 80.370413][ T7050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.380458][ T7050] Call Trace: [ 80.383737][ T7050] dump_stack+0xbc/0xe6 [ 80.387867][ T7050] should_fail.cold+0x3c/0x49 [ 80.392512][ T7050] __should_failslab+0x65/0xa0 [ 80.397247][ T7050] should_failslab+0x9/0x14 [ 80.401721][ T7050] kmem_cache_alloc+0x26/0x2c0 [ 80.406456][ T7050] create_object+0x3d/0x360 [ 80.410942][ T7050] kmemleak_alloc+0x21/0x30 [ 80.415420][ T7050] __kmalloc_track_caller+0x165/0x300 [ 80.420783][ T7050] ? stack_trace_consume_entry+0x54/0x80 [ 80.426384][ T7050] ? kstrdup_const+0x48/0x60 [ 80.430947][ T7050] kstrdup+0x3a/0x70 [ 80.434912][ T7050] kstrdup_const+0x48/0x60 [ 80.439432][ T7050] __kernfs_new_node+0x53/0x280 [ 80.444260][ T7050] ? make_kgid+0x23/0x30 [ 80.448558][ T7050] kernfs_new_node+0x5e/0x90 [ 80.453213][ T7050] kernfs_create_dir_ns+0x52/0xb0 [ 80.458207][ T7050] sysfs_create_dir_ns+0x8a/0x120 [ 80.463221][ T7050] kobject_add_internal+0x103/0x350 [ 80.468847][ T7050] kobject_add+0x9e/0xe0 [ 80.473237][ T7050] ? _raw_spin_unlock+0x1f/0x40 [ 80.478057][ T7050] ? get_device_parent.isra.0+0x108/0x240 [ 80.483767][ T7050] device_add+0x19d/0xa60 [ 80.488085][ T7050] netdev_register_kobject+0xa6/0x1b0 [ 80.493432][ T7050] register_netdevice+0x1ce/0x650 [ 80.498427][ T7050] hsr_dev_finalize+0x18a/0x237 [ 80.503947][ T7050] hsr_newlink+0xf3/0x140 [ 80.508376][ T7050] ? hsr_fill_info+0x180/0x180 [ 80.513118][ T7050] __rtnl_newlink+0x89a/0xb80 [ 80.517788][ T7050] ? is_bpf_text_address+0x24/0x30 [ 80.523140][ T7050] ? kernel_text_address+0x45/0xb0 [ 80.528227][ T7050] ? full_name_hash+0x98/0xe0 [ 80.532875][ T7050] ? tomoyo_merge_path_acl+0x39/0x60 [ 80.538131][ T7050] ? tomoyo_same_path_acl+0x60/0x60 [ 80.543301][ T7050] ? tomoyo_update_domain+0x9f/0x1f0 [ 80.548644][ T7050] ? debug_smp_processor_id+0x27/0xad [ 80.553986][ T7050] ? rcu_is_watching+0x11/0x50 [ 80.558735][ T7050] ? bpf_prog_kallsyms_find+0xee/0x120 [ 80.564167][ T7050] ? __rtnl_newlink+0xb80/0xb80 [ 80.569006][ T7050] rtnl_newlink+0x4e/0x80 [ 80.573316][ T7050] rtnetlink_rcv_msg+0x178/0x4b0 [ 80.578244][ T7050] ? rtnl_calcit.isra.0+0x170/0x170 [ 80.583434][ T7050] netlink_rcv_skb+0x61/0x170 [ 80.588085][ T7050] rtnetlink_rcv+0x1d/0x30 [ 80.592474][ T7050] netlink_unicast+0x223/0x310 [ 80.597210][ T7050] netlink_sendmsg+0x2c0/0x570 [ 80.601973][ T7050] sock_sendmsg+0x54/0x70 [ 80.606270][ T7050] ____sys_sendmsg+0x2d0/0x300 [ 80.611007][ T7050] ___sys_sendmsg+0x8a/0xd0 [ 80.615485][ T7050] ? kstrtouint+0x76/0xa0 [ 80.619786][ T7050] ? kstrtouint_from_user+0x7f/0xb0 [ 80.624958][ T7050] ? __fget_light+0x70/0xb0 [ 80.629444][ T7050] ? __fdget+0x1b/0x20 [ 80.633517][ T7050] ? sockfd_lookup_light+0x6c/0xb0 [ 80.638732][ T7050] __sys_sendmsg+0x80/0xf0 [ 80.643298][ T7050] __x64_sys_sendmsg+0x23/0x30 [ 80.648049][ T7050] do_syscall_64+0x73/0x220 [ 80.652565][ T7050] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 80.658446][ T7050] RIP: 0033:0x442299 [ 80.662312][ T7050] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 80.681902][ T7050] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 80.690376][ T7050] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 80.698330][ T7050] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 80.706324][ T7050] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 80.714394][ T7050] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 80.722433][ T7050] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 80.731436][ T7050] device veth3 entered promiscuous mode [ 80.779013][ T7050] gre0: Cannot use loopback or non-ethernet device as HSR slave. [ 80.878999][ T7050] device veth3 left promiscuous mode executing program [ 86.811937][ T7051] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 86.859009][ T7051] FAULT_INJECTION: forcing a failure. [ 86.859009][ T7051] name failslab, interval 1, probability 0, space 0, times 0 [ 86.871657][ T7051] CPU: 1 PID: 7051 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 86.880335][ T7051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 86.890362][ T7051] Call Trace: [ 86.893621][ T7051] dump_stack+0xbc/0xe6 [ 86.897747][ T7051] should_fail.cold+0x3c/0x49 [ 86.902425][ T7051] __should_failslab+0x65/0xa0 [ 86.907182][ T7051] should_failslab+0x9/0x14 [ 86.911656][ T7051] kmem_cache_alloc+0x26/0x2c0 [ 86.916388][ T7051] create_object+0x3d/0x360 [ 86.920868][ T7051] kmemleak_alloc+0x21/0x30 [ 86.925352][ T7051] __kmalloc_track_caller+0x165/0x300 [ 86.930696][ T7051] ? stack_trace_consume_entry+0x54/0x80 [ 86.936302][ T7051] ? kstrdup_const+0x48/0x60 [ 86.940863][ T7051] kstrdup+0x3a/0x70 [ 86.944729][ T7051] kstrdup_const+0x48/0x60 [ 86.949130][ T7051] __kernfs_new_node+0x53/0x280 [ 86.954076][ T7051] ? make_kgid+0x23/0x30 [ 86.958414][ T7051] kernfs_new_node+0x5e/0x90 [ 86.962975][ T7051] kernfs_create_dir_ns+0x52/0xb0 [ 86.967967][ T7051] sysfs_create_dir_ns+0x8a/0x120 [ 86.972980][ T7051] kobject_add_internal+0x103/0x350 [ 86.978147][ T7051] kobject_add+0x9e/0xe0 [ 86.982358][ T7051] ? _raw_spin_unlock+0x1f/0x40 [ 86.987184][ T7051] ? get_device_parent.isra.0+0x108/0x240 [ 86.992886][ T7051] device_add+0x19d/0xa60 [ 86.997195][ T7051] netdev_register_kobject+0xa6/0x1b0 [ 87.002566][ T7051] register_netdevice+0x1ce/0x650 [ 87.007700][ T7051] hsr_dev_finalize+0x18a/0x237 [ 87.012524][ T7051] hsr_newlink+0xf3/0x140 [ 87.016825][ T7051] ? hsr_fill_info+0x180/0x180 [ 87.021563][ T7051] __rtnl_newlink+0x89a/0xb80 [ 87.026226][ T7051] ? is_bpf_text_address+0x24/0x30 [ 87.031322][ T7051] ? kernel_text_address+0x45/0xb0 [ 87.036410][ T7051] ? full_name_hash+0x98/0xe0 [ 87.041155][ T7051] ? tomoyo_merge_path_acl+0x39/0x60 [ 87.046414][ T7051] ? tomoyo_same_path_acl+0x60/0x60 [ 87.051678][ T7051] ? tomoyo_update_domain+0x9f/0x1f0 [ 87.056943][ T7051] ? debug_smp_processor_id+0x27/0xad [ 87.062552][ T7051] ? rcu_is_watching+0x11/0x50 [ 87.067287][ T7051] ? bpf_prog_kallsyms_find+0xee/0x120 [ 87.072737][ T7051] ? __rtnl_newlink+0xb80/0xb80 [ 87.077570][ T7051] rtnl_newlink+0x4e/0x80 [ 87.081883][ T7051] rtnetlink_rcv_msg+0x178/0x4b0 [ 87.086797][ T7051] ? rtnl_calcit.isra.0+0x170/0x170 [ 87.091973][ T7051] netlink_rcv_skb+0x61/0x170 [ 87.096620][ T7051] rtnetlink_rcv+0x1d/0x30 [ 87.101007][ T7051] netlink_unicast+0x223/0x310 [ 87.105834][ T7051] netlink_sendmsg+0x2c0/0x570 [ 87.110581][ T7051] sock_sendmsg+0x54/0x70 [ 87.114892][ T7051] ____sys_sendmsg+0x2d0/0x300 [ 87.119656][ T7051] ___sys_sendmsg+0x8a/0xd0 [ 87.124131][ T7051] ? kstrtouint+0x76/0xa0 [ 87.128434][ T7051] ? kstrtouint_from_user+0x7f/0xb0 [ 87.133620][ T7051] ? __fget_light+0x70/0xb0 [ 87.138094][ T7051] ? __fdget+0x1b/0x20 [ 87.142134][ T7051] ? sockfd_lookup_light+0x6c/0xb0 [ 87.147222][ T7051] __sys_sendmsg+0x80/0xf0 [ 87.151609][ T7051] __x64_sys_sendmsg+0x23/0x30 [ 87.156359][ T7051] do_syscall_64+0x73/0x220 [ 87.160849][ T7051] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 87.166709][ T7051] RIP: 0033:0x442299 [ 87.170574][ T7051] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 87.190177][ T7051] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 87.198732][ T7051] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 87.206697][ T7051] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 87.214745][ T7051] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 87.223225][ T7051] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 87.231169][ T7051] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 87.239975][ T7051] device veth5 entered promiscuous mode [ 87.309015][ T7051] device gretap0 entered promiscuous mode executing program [ 93.228306][ T7052] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 93.288982][ T7052] FAULT_INJECTION: forcing a failure. [ 93.288982][ T7052] name failslab, interval 1, probability 0, space 0, times 0 [ 93.301628][ T7052] CPU: 1 PID: 7052 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 93.310284][ T7052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.320322][ T7052] Call Trace: [ 93.323594][ T7052] dump_stack+0xbc/0xe6 [ 93.327814][ T7052] should_fail.cold+0x3c/0x49 [ 93.332760][ T7052] __should_failslab+0x65/0xa0 [ 93.337517][ T7052] should_failslab+0x9/0x14 [ 93.342013][ T7052] kmem_cache_alloc+0x26/0x2c0 [ 93.346747][ T7052] create_object+0x3d/0x360 [ 93.351223][ T7052] kmemleak_alloc+0x21/0x30 [ 93.355808][ T7052] __kmalloc_track_caller+0x165/0x300 [ 93.361339][ T7052] ? kstrdup_const+0x48/0x60 [ 93.365898][ T7052] kstrdup+0x3a/0x70 [ 93.369766][ T7052] kstrdup_const+0x48/0x60 [ 93.374174][ T7052] __kernfs_new_node+0x53/0x280 [ 93.379000][ T7052] ? make_kgid+0x23/0x30 [ 93.383315][ T7052] kernfs_new_node+0x5e/0x90 [ 93.387909][ T7052] kernfs_create_dir_ns+0x52/0xb0 [ 93.392929][ T7052] sysfs_create_dir_ns+0x8a/0x120 [ 93.397926][ T7052] kobject_add_internal+0x103/0x350 [ 93.403201][ T7052] kobject_add+0x9e/0xe0 [ 93.407427][ T7052] ? _raw_spin_unlock+0x1f/0x40 [ 93.412543][ T7052] ? get_device_parent.isra.0+0x108/0x240 [ 93.418235][ T7052] device_add+0x19d/0xa60 [ 93.422545][ T7052] netdev_register_kobject+0xa6/0x1b0 [ 93.427905][ T7052] register_netdevice+0x1ce/0x650 [ 93.433022][ T7052] hsr_dev_finalize+0x18a/0x237 [ 93.437863][ T7052] hsr_newlink+0xf3/0x140 [ 93.442178][ T7052] ? hsr_fill_info+0x180/0x180 [ 93.446921][ T7052] __rtnl_newlink+0x89a/0xb80 [ 93.451576][ T7052] ? is_bpf_text_address+0x24/0x30 [ 93.456679][ T7052] ? kernel_text_address+0x45/0xb0 [ 93.461763][ T7052] ? full_name_hash+0x98/0xe0 [ 93.466413][ T7052] ? tomoyo_merge_path_acl+0x39/0x60 [ 93.471779][ T7052] ? tomoyo_same_path_acl+0x60/0x60 [ 93.476963][ T7052] ? tomoyo_update_domain+0x9f/0x1f0 [ 93.482219][ T7052] ? debug_smp_processor_id+0x27/0xad [ 93.487571][ T7052] ? rcu_is_watching+0x11/0x50 [ 93.492312][ T7052] ? bpf_prog_kallsyms_find+0xee/0x120 [ 93.497757][ T7052] ? __rtnl_newlink+0xb80/0xb80 [ 93.502617][ T7052] rtnl_newlink+0x4e/0x80 [ 93.506917][ T7052] rtnetlink_rcv_msg+0x178/0x4b0 [ 93.511844][ T7052] ? rtnl_calcit.isra.0+0x170/0x170 [ 93.517023][ T7052] netlink_rcv_skb+0x61/0x170 [ 93.521690][ T7052] rtnetlink_rcv+0x1d/0x30 [ 93.526091][ T7052] netlink_unicast+0x223/0x310 [ 93.530844][ T7052] netlink_sendmsg+0x2c0/0x570 [ 93.535666][ T7052] sock_sendmsg+0x54/0x70 [ 93.539986][ T7052] ____sys_sendmsg+0x2d0/0x300 [ 93.544741][ T7052] ___sys_sendmsg+0x8a/0xd0 [ 93.549230][ T7052] ? kstrtouint+0x76/0xa0 [ 93.553551][ T7052] ? kstrtouint_from_user+0x7f/0xb0 [ 93.558722][ T7052] ? __fget_light+0x70/0xb0 [ 93.563233][ T7052] ? __fdget+0x1b/0x20 [ 93.567276][ T7052] ? sockfd_lookup_light+0x6c/0xb0 [ 93.572366][ T7052] __sys_sendmsg+0x80/0xf0 [ 93.576767][ T7052] __x64_sys_sendmsg+0x23/0x30 [ 93.581609][ T7052] do_syscall_64+0x73/0x220 [ 93.586106][ T7052] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 93.592071][ T7052] RIP: 0033:0x442299 [ 93.596022][ T7052] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 93.615618][ T7052] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 93.624093][ T7052] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 93.632051][ T7052] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 93.640007][ T7052] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 93.647951][ T7052] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 93.656031][ T7052] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 93.665104][ T7052] device veth7 entered promiscuous mode [ 93.719038][ T7052] device erspan0 entered promiscuous mode executing program [ 99.619504][ T7053] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 99.668997][ T7053] FAULT_INJECTION: forcing a failure. [ 99.668997][ T7053] name failslab, interval 1, probability 0, space 0, times 0 [ 99.681634][ T7053] CPU: 1 PID: 7053 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 99.690281][ T7053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.700308][ T7053] Call Trace: [ 99.703819][ T7053] dump_stack+0xbc/0xe6 [ 99.707984][ T7053] should_fail.cold+0x3c/0x49 [ 99.712641][ T7053] __should_failslab+0x65/0xa0 [ 99.717376][ T7053] should_failslab+0x9/0x14 [ 99.721855][ T7053] kmem_cache_alloc+0x26/0x2c0 [ 99.726590][ T7053] create_object+0x3d/0x360 [ 99.731080][ T7053] kmemleak_alloc+0x21/0x30 [ 99.735566][ T7053] __kmalloc_track_caller+0x165/0x300 [ 99.740932][ T7053] ? stack_trace_consume_entry+0x54/0x80 [ 99.746577][ T7053] ? kstrdup_const+0x48/0x60 [ 99.751160][ T7053] kstrdup+0x3a/0x70 [ 99.755033][ T7053] kstrdup_const+0x48/0x60 [ 99.759420][ T7053] __kernfs_new_node+0x53/0x280 [ 99.764274][ T7053] ? make_kgid+0x23/0x30 [ 99.768505][ T7053] kernfs_new_node+0x5e/0x90 [ 99.773134][ T7053] kernfs_create_dir_ns+0x52/0xb0 [ 99.778149][ T7053] sysfs_create_dir_ns+0x8a/0x120 [ 99.783276][ T7053] kobject_add_internal+0x103/0x350 [ 99.788769][ T7053] kobject_add+0x9e/0xe0 [ 99.792997][ T7053] ? _raw_spin_unlock+0x1f/0x40 [ 99.797834][ T7053] ? get_device_parent.isra.0+0x108/0x240 [ 99.803888][ T7053] device_add+0x19d/0xa60 [ 99.808206][ T7053] netdev_register_kobject+0xa6/0x1b0 [ 99.814246][ T7053] register_netdevice+0x1ce/0x650 [ 99.819504][ T7053] hsr_dev_finalize+0x18a/0x237 [ 99.824342][ T7053] hsr_newlink+0xf3/0x140 [ 99.828638][ T7053] ? hsr_fill_info+0x180/0x180 [ 99.833375][ T7053] __rtnl_newlink+0x89a/0xb80 [ 99.838034][ T7053] ? is_bpf_text_address+0x24/0x30 [ 99.843115][ T7053] ? kernel_text_address+0x45/0xb0 [ 99.848203][ T7053] ? full_name_hash+0x98/0xe0 [ 99.852849][ T7053] ? tomoyo_merge_path_acl+0x39/0x60 [ 99.858107][ T7053] ? tomoyo_same_path_acl+0x60/0x60 [ 99.863285][ T7053] ? tomoyo_update_domain+0x9f/0x1f0 [ 99.868546][ T7053] ? debug_smp_processor_id+0x27/0xad [ 99.873919][ T7053] ? rcu_is_watching+0x11/0x50 [ 99.878654][ T7053] ? bpf_prog_kallsyms_find+0xee/0x120 [ 99.884099][ T7053] ? __rtnl_newlink+0xb80/0xb80 [ 99.888921][ T7053] rtnl_newlink+0x4e/0x80 [ 99.893245][ T7053] rtnetlink_rcv_msg+0x178/0x4b0 [ 99.898165][ T7053] ? rtnl_calcit.isra.0+0x170/0x170 [ 99.903335][ T7053] netlink_rcv_skb+0x61/0x170 [ 99.907979][ T7053] rtnetlink_rcv+0x1d/0x30 [ 99.912463][ T7053] netlink_unicast+0x223/0x310 [ 99.917207][ T7053] netlink_sendmsg+0x2c0/0x570 [ 99.921977][ T7053] sock_sendmsg+0x54/0x70 [ 99.926275][ T7053] ____sys_sendmsg+0x2d0/0x300 [ 99.931011][ T7053] ___sys_sendmsg+0x8a/0xd0 [ 99.936180][ T7053] ? kstrtouint+0x76/0xa0 [ 99.940482][ T7053] ? kstrtouint_from_user+0x7f/0xb0 [ 99.945669][ T7053] ? __fget_light+0x70/0xb0 [ 99.950140][ T7053] ? __fdget+0x1b/0x20 [ 99.954182][ T7053] ? sockfd_lookup_light+0x6c/0xb0 [ 99.959271][ T7053] __sys_sendmsg+0x80/0xf0 [ 99.963672][ T7053] __x64_sys_sendmsg+0x23/0x30 [ 99.968417][ T7053] do_syscall_64+0x73/0x220 [ 99.972921][ T7053] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 99.978790][ T7053] RIP: 0033:0x442299 [ 99.982671][ T7053] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 100.002363][ T7053] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 100.010748][ T7053] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 100.018692][ T7053] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 100.026640][ T7053] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 100.034587][ T7053] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 100.042620][ T7053] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 100.051633][ T7053] device veth9 entered promiscuous mode [ 100.099003][ T7053] ip_vti0: Cannot use loopback or non-ethernet device as HSR slave. [ 100.148965][ T7053] device veth9 left promiscuous mode executing program [ 106.072210][ T7054] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 106.109025][ T7054] FAULT_INJECTION: forcing a failure. [ 106.109025][ T7054] name failslab, interval 1, probability 0, space 0, times 0 [ 106.121784][ T7054] CPU: 1 PID: 7054 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 106.130441][ T7054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.140732][ T7054] Call Trace: [ 106.144009][ T7054] dump_stack+0xbc/0xe6 [ 106.148146][ T7054] should_fail.cold+0x3c/0x49 [ 106.152813][ T7054] __should_failslab+0x65/0xa0 [ 106.157549][ T7054] should_failslab+0x9/0x14 [ 106.162022][ T7054] kmem_cache_alloc+0x26/0x2c0 [ 106.166795][ T7054] create_object+0x3d/0x360 [ 106.171269][ T7054] kmemleak_alloc+0x21/0x30 [ 106.175744][ T7054] __kmalloc_track_caller+0x165/0x300 [ 106.181095][ T7054] ? stack_trace_consume_entry+0x54/0x80 [ 106.186783][ T7054] ? kstrdup_const+0x48/0x60 [ 106.191357][ T7054] kstrdup+0x3a/0x70 [ 106.195339][ T7054] kstrdup_const+0x48/0x60 [ 106.199741][ T7054] __kernfs_new_node+0x53/0x280 [ 106.204740][ T7054] ? make_kgid+0x23/0x30 [ 106.209141][ T7054] kernfs_new_node+0x5e/0x90 [ 106.213789][ T7054] kernfs_create_dir_ns+0x52/0xb0 [ 106.218788][ T7054] sysfs_create_dir_ns+0x8a/0x120 [ 106.225109][ T7054] kobject_add_internal+0x103/0x350 [ 106.230291][ T7054] kobject_add+0x9e/0xe0 [ 106.234521][ T7054] ? _raw_spin_unlock+0x1f/0x40 [ 106.239361][ T7054] ? get_device_parent.isra.0+0x108/0x240 [ 106.245059][ T7054] device_add+0x19d/0xa60 [ 106.249374][ T7054] netdev_register_kobject+0xa6/0x1b0 [ 106.254735][ T7054] register_netdevice+0x1ce/0x650 [ 106.259781][ T7054] hsr_dev_finalize+0x18a/0x237 [ 106.264731][ T7054] hsr_newlink+0xf3/0x140 [ 106.269040][ T7054] ? hsr_fill_info+0x180/0x180 [ 106.273793][ T7054] __rtnl_newlink+0x89a/0xb80 [ 106.278448][ T7054] ? is_bpf_text_address+0x24/0x30 [ 106.283531][ T7054] ? kernel_text_address+0x45/0xb0 [ 106.288799][ T7054] ? full_name_hash+0x98/0xe0 [ 106.293622][ T7054] ? tomoyo_merge_path_acl+0x39/0x60 [ 106.298878][ T7054] ? tomoyo_same_path_acl+0x60/0x60 [ 106.304052][ T7054] ? tomoyo_update_domain+0x9f/0x1f0 [ 106.309306][ T7054] ? debug_smp_processor_id+0x27/0xad [ 106.314666][ T7054] ? rcu_is_watching+0x11/0x50 [ 106.319404][ T7054] ? bpf_prog_kallsyms_find+0xee/0x120 [ 106.324835][ T7054] ? __rtnl_newlink+0xb80/0xb80 [ 106.329656][ T7054] rtnl_newlink+0x4e/0x80 [ 106.333969][ T7054] rtnetlink_rcv_msg+0x178/0x4b0 [ 106.338880][ T7054] ? rtnl_calcit.isra.0+0x170/0x170 [ 106.344074][ T7054] netlink_rcv_skb+0x61/0x170 [ 106.349085][ T7054] rtnetlink_rcv+0x1d/0x30 [ 106.353507][ T7054] netlink_unicast+0x223/0x310 [ 106.358331][ T7054] netlink_sendmsg+0x2c0/0x570 [ 106.363088][ T7054] sock_sendmsg+0x54/0x70 [ 106.367397][ T7054] ____sys_sendmsg+0x2d0/0x300 [ 106.372201][ T7054] ___sys_sendmsg+0x8a/0xd0 [ 106.376798][ T7054] ? kstrtouint+0x76/0xa0 [ 106.381114][ T7054] ? kstrtouint_from_user+0x7f/0xb0 [ 106.386290][ T7054] ? __fget_light+0x70/0xb0 [ 106.390763][ T7054] ? __fdget+0x1b/0x20 [ 106.394804][ T7054] ? sockfd_lookup_light+0x6c/0xb0 [ 106.399883][ T7054] __sys_sendmsg+0x80/0xf0 [ 106.404289][ T7054] __x64_sys_sendmsg+0x23/0x30 [ 106.409031][ T7054] do_syscall_64+0x73/0x220 [ 106.413606][ T7054] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.419474][ T7054] RIP: 0033:0x442299 [ 106.423342][ T7054] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 106.443190][ T7054] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 106.451730][ T7054] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 106.459679][ T7054] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 106.467663][ T7054] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 106.475625][ T7054] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 106.483590][ T7054] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 106.492496][ T7054] device veth11 entered promiscuous mode [ 106.528996][ T7054] ip6_vti0: Cannot use loopback or non-ethernet device as HSR slave. [ 106.619019][ T7054] device veth11 left promiscuous mode executing program [ 112.535756][ T7055] netlink: 20 bytes leftover after parsing attributes in process `syz-executor270'. [ 112.579059][ T7055] FAULT_INJECTION: forcing a failure. [ 112.579059][ T7055] name failslab, interval 1, probability 0, space 0, times 0 [ 112.591887][ T7055] CPU: 0 PID: 7055 Comm: syz-executor270 Not tainted 5.5.0-rc5-syzkaller #0 [ 112.600618][ T7055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.610661][ T7055] Call Trace: [ 112.613935][ T7055] dump_stack+0xbc/0xe6 [ 112.618073][ T7055] should_fail.cold+0x3c/0x49 [ 112.622886][ T7055] __should_failslab+0x65/0xa0 [ 112.627736][ T7055] should_failslab+0x9/0x14 [ 112.632277][ T7055] __kmalloc_track_caller+0x50/0x300 [ 112.637547][ T7055] ? load_balance+0x16c/0xce0 [ 112.642221][ T7055] ? kstrdup_const+0x48/0x60 [ 112.646782][ T7055] kstrdup+0x3a/0x70 [ 112.650648][ T7055] kstrdup_const+0x48/0x60 [ 112.655034][ T7055] __kernfs_new_node+0x53/0x280 [ 112.659870][ T7055] ? make_kgid+0x23/0x30 [ 112.664097][ T7055] kernfs_new_node+0x5e/0x90 [ 112.668670][ T7055] kernfs_create_dir_ns+0x52/0xb0 [ 112.673670][ T7055] sysfs_create_dir_ns+0x8a/0x120 [ 112.678675][ T7055] kobject_add_internal+0x103/0x350 [ 112.683857][ T7055] kobject_add+0x9e/0xe0 [ 112.688089][ T7055] ? _raw_spin_unlock+0x1f/0x40 [ 112.692912][ T7055] ? get_device_parent.isra.0+0x108/0x240 [ 112.698597][ T7055] device_add+0x19d/0xa60 [ 112.702896][ T7055] netdev_register_kobject+0xa6/0x1b0 [ 112.708233][ T7055] register_netdevice+0x1ce/0x650 [ 112.713226][ T7055] hsr_dev_finalize+0x18a/0x237 [ 112.718058][ T7055] hsr_newlink+0xf3/0x140 [ 112.722356][ T7055] ? hsr_fill_info+0x180/0x180 [ 112.727180][ T7055] __rtnl_newlink+0x89a/0xb80 [ 112.731835][ T7055] ? is_bpf_text_address+0x24/0x30 [ 112.736917][ T7055] ? kernel_text_address+0x45/0xb0 [ 112.742017][ T7055] ? full_name_hash+0x98/0xe0 [ 112.746683][ T7055] ? tomoyo_merge_path_acl+0x39/0x60 [ 112.751937][ T7055] ? tomoyo_same_path_acl+0x60/0x60 [ 112.757120][ T7055] ? tomoyo_update_domain+0x9f/0x1f0 [ 112.762389][ T7055] ? debug_smp_processor_id+0x27/0xad [ 112.767735][ T7055] ? rcu_is_watching+0x11/0x50 [ 112.772482][ T7055] ? bpf_prog_kallsyms_find+0xee/0x120 [ 112.777936][ T7055] ? __rtnl_newlink+0xb80/0xb80 [ 112.782755][ T7055] rtnl_newlink+0x4e/0x80 [ 112.787053][ T7055] rtnetlink_rcv_msg+0x178/0x4b0 [ 112.792004][ T7055] ? rtnl_calcit.isra.0+0x170/0x170 [ 112.797227][ T7055] netlink_rcv_skb+0x61/0x170 [ 112.801877][ T7055] rtnetlink_rcv+0x1d/0x30 [ 112.806302][ T7055] netlink_unicast+0x223/0x310 [ 112.811034][ T7055] netlink_sendmsg+0x2c0/0x570 [ 112.815765][ T7055] sock_sendmsg+0x54/0x70 [ 112.820077][ T7055] ____sys_sendmsg+0x2d0/0x300 [ 112.824960][ T7055] ___sys_sendmsg+0x8a/0xd0 [ 112.829439][ T7055] ? kstrtouint+0x76/0xa0 [ 112.833770][ T7055] ? kstrtouint_from_user+0x7f/0xb0 [ 112.839028][ T7055] ? __fget_light+0x70/0xb0 [ 112.843499][ T7055] ? __fdget+0x1b/0x20 [ 112.847540][ T7055] ? sockfd_lookup_light+0x6c/0xb0 [ 112.852636][ T7055] __sys_sendmsg+0x80/0xf0 [ 112.857024][ T7055] __x64_sys_sendmsg+0x23/0x30 [ 112.861759][ T7055] do_syscall_64+0x73/0x220 [ 112.866261][ T7055] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.872124][ T7055] RIP: 0033:0x442299 [ 112.876004][ T7055] Code: e8 6c e8 ff ff 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb 09 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 112.895624][ T7055] RSP: 002b:00007fffa9ac4f58 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 112.904021][ T7055] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000442299 [ 112.911968][ T7055] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 112.919933][ T7055] RBP: 00007fffa9ac4fb0 R08: 0000000000000002 R09: 0000000000000000 [ 112.927890][ T7055] R10: 0000000000000000 R11: 0000000000000246 R12: ffffffffffffffff [ 112.935830][ T7055] R13: 0000000000000008 R14: 00007fffa9ac4fb0 R15: 0000000000000000 [ 112.943832][ T7055] kobject_add_internal failed for hsr2 (error: -12 parent: net) [ 118.716960][ T7048] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88812270c520 (size 32): comm "syz-executor270", pid 7055, jiffies 4294948523 (age 8.130s) hex dump (first 32 bytes): 68 73 72 32 00 74 61 73 6b 2f 37 30 35 35 00 00 hsr2.task/7055.. 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<00000000b42e7710>] __kmalloc_track_caller+0x165/0x300 [<000000008569963f>] kstrdup+0x3a/0x70 [<00000000204bbed3>] kstrdup_const+0x48/0x60 [<00000000ff52391d>] kvasprintf_const+0x7e/0xe0 [<00000000a20bbc65>] kobject_set_name_vargs+0x40/0xe0 [<00000000cfc008cf>] dev_set_name+0x63/0x90 [<00000000ccb59687>] netdev_register_kobject+0x5a/0x1b0 [<00000000e6b9a240>] register_netdevice+0x1ce/0x650 [<0000000096892948>] hsr_dev_finalize+0x18a/0x237 [<00000000c8518644>] hsr_newlink+0xf3/0x140 [<000000007cf93c00>] __rtnl_newlink+0x89a/0xb80 [<0000000042958141>] rtnl_newlink+0x4e/0x80 [<000000000dee18e6>] rtnetlink_rcv_msg+0x178/0x4b0 [<000000009454c64e>] netlink_rcv_skb+0x61/0x170 [<0000000037bee182>] rtnetlink_rcv+0x1d/0x30 [<00000000a11ea5f9>] netlink_unicast+0x223/0x310