[ 36.571696] audit: type=1800 audit(1568640864.957:32): pid=7279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2450 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 37.361989] audit: type=1800 audit(1568640865.837:33): pid=7279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.9' (ECDSA) to the list of known hosts. 2019/09/16 13:34:34 fuzzer started syzkaller login: [ 46.180893] kauditd_printk_skb: 2 callbacks suppressed [ 46.180908] audit: type=1400 audit(1568640874.657:36): avc: denied { map } for pid=7464 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/09/16 13:34:36 dialing manager at 10.128.0.105:39271 2019/09/16 13:34:36 syscalls: 2482 2019/09/16 13:34:36 code coverage: enabled 2019/09/16 13:34:36 comparison tracing: enabled 2019/09/16 13:34:36 extra coverage: extra coverage is not supported by the kernel 2019/09/16 13:34:36 setuid sandbox: enabled 2019/09/16 13:34:36 namespace sandbox: enabled 2019/09/16 13:34:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/16 13:34:36 fault injection: enabled 2019/09/16 13:34:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/16 13:34:36 net packet injection: enabled 2019/09/16 13:34:36 net device setup: enabled 13:36:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") symlink(&(0x7f00000000c0)='..', &(0x7f0000000040)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='devpts\x00E\xe6\xcb\xf6~\x11mS,!\xd7\xc5_\x96j\xc3\xcb\xe8@\x8a\xd7\x0f\xbc\\\xbe\x9b2\xc4\x8cp\xe8\xe2\xdf\xdf\xb6\xc6}\xde\x0e9\xd9\x8b\xf6e\x04g7T:-*w\x88\x9b\xc3\x16(\xfe\xc2=T\xab\xaa\xfe\xca\xf7I>#htW\xeac_\xf5\x0e\xd7\xa2\xe5\x86l\xa8\x00\xd6\xbf\x01B\xbe\xe3h\xab\x15\b\x02 \xcdu\xbf\xfaho>/\xe4\x02+)3\xb6\x8a\xc8\xde\x9f\xb2\x19t\x16\x8b\xd7U\xfc\x97L\xe0\'\xf4\x8e\xd0\x00\x00\x00\x00', 0x0, 0x0) [ 179.789851] audit: type=1400 audit(1568641008.267:37): avc: denied { map } for pid=7483 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=14994 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 179.910563] IPVS: ftp: loaded support on port[0] = 21 13:36:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=fd,', {'\x02\x00\x00\x00o'}, 0x2c, {'wfdno'}}) [ 180.054819] chnl_net:caif_netlink_parms(): no params data found 13:36:48 executing program 2: getrandom(&(0x7f0000000180)=""/105, 0x69, 0x3) [ 180.138569] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.145291] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.153214] device bridge_slave_0 entered promiscuous mode [ 180.168280] IPVS: ftp: loaded support on port[0] = 21 [ 180.177576] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.186225] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.199290] device bridge_slave_1 entered promiscuous mode [ 180.279026] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.308279] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 180.338778] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 180.346488] team0: Port device team_slave_0 added [ 180.374135] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 180.384385] team0: Port device team_slave_1 added [ 180.390276] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 180.418728] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 180.428874] chnl_net:caif_netlink_parms(): no params data found 13:36:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="00800000000000007bf070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xffffff2d}, {0x0}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x1, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 180.440299] IPVS: ftp: loaded support on port[0] = 21 13:36:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6}]}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="000000000000000672e0be8fe331e35e3574b586715069e11700"], 0x8) setsockopt$inet6_opts(r0, 0x29, 0x3b, 0x0, 0x0) [ 180.550518] device hsr_slave_0 entered promiscuous mode [ 180.588034] device hsr_slave_1 entered promiscuous mode [ 180.638927] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 180.674621] IPVS: ftp: loaded support on port[0] = 21 [ 180.695609] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 180.727073] IPVS: ftp: loaded support on port[0] = 21 [ 180.770671] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.778158] bridge0: port 1(bridge_slave_0) entered disabled state [ 180.785647] device bridge_slave_0 entered promiscuous mode [ 180.799984] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.806524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 180.813614] bridge0: port 1(bridge_slave_0) entered blocking state [ 180.820051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 180.843644] bridge0: port 2(bridge_slave_1) entered blocking state [ 180.852195] bridge0: port 2(bridge_slave_1) entered disabled state [ 180.861065] device bridge_slave_1 entered promiscuous mode 13:36:49 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cuse\x00', 0x2842, 0x0) read(r0, 0x0, 0x0) io_setup(0x82, &(0x7f00000003c0)=0x0) io_submit(r1, 0x1, &(0x7f00000004c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 180.968854] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 180.996306] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.021525] chnl_net:caif_netlink_parms(): no params data found [ 181.039215] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.048502] team0: Port device team_slave_0 added [ 181.057409] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.065974] team0: Port device team_slave_1 added [ 181.073110] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.093420] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.111418] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.123022] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.151267] chnl_net:caif_netlink_parms(): no params data found [ 181.179914] IPVS: ftp: loaded support on port[0] = 21 [ 181.279145] device hsr_slave_0 entered promiscuous mode [ 181.317211] device hsr_slave_1 entered promiscuous mode [ 181.382747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.394020] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 181.421786] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.428280] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.435373] device bridge_slave_0 entered promiscuous mode [ 181.446073] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.452544] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.460044] device bridge_slave_1 entered promiscuous mode [ 181.480654] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.487885] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.494831] device bridge_slave_0 entered promiscuous mode [ 181.502569] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.509049] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.515977] device bridge_slave_1 entered promiscuous mode [ 181.540425] chnl_net:caif_netlink_parms(): no params data found [ 181.571104] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.580006] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.596142] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.616010] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.624465] team0: Port device team_slave_0 added [ 181.632281] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.641106] team0: Port device team_slave_1 added [ 181.647041] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 181.653499] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.666419] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.684002] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.695637] bridge0: port 1(bridge_slave_0) entered blocking state [ 181.702162] bridge0: port 1(bridge_slave_0) entered disabled state [ 181.709577] device bridge_slave_0 entered promiscuous mode [ 181.723205] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 181.730842] team0: Port device team_slave_0 added [ 181.737540] 8021q: adding VLAN 0 to HW filter on device bond0 [ 181.743808] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 181.751292] team0: Port device team_slave_1 added [ 181.761809] bridge0: port 2(bridge_slave_1) entered blocking state [ 181.770285] bridge0: port 2(bridge_slave_1) entered disabled state [ 181.778039] device bridge_slave_1 entered promiscuous mode [ 181.859397] device hsr_slave_0 entered promiscuous mode [ 181.897039] device hsr_slave_1 entered promiscuous mode [ 181.937667] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 181.945338] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 181.960030] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 181.969906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 181.983489] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 181.991962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 182.000166] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.038650] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 182.046040] team0: Port device team_slave_0 added [ 182.078854] device hsr_slave_0 entered promiscuous mode [ 182.117006] device hsr_slave_1 entered promiscuous mode [ 182.157637] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 182.205117] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 182.213386] team0: Port device team_slave_1 added [ 182.224735] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 182.235909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.247034] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 182.255898] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.266381] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.272996] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.282731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 182.295448] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.304181] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.312129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.326219] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.333275] chnl_net:caif_netlink_parms(): no params data found [ 182.391112] device hsr_slave_0 entered promiscuous mode [ 182.427117] device hsr_slave_1 entered promiscuous mode [ 182.467652] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 182.475902] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 182.490993] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.498442] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.511676] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 182.520334] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 182.527618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 182.537889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.546004] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.553958] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.561595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.573448] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 182.580799] 8021q: adding VLAN 0 to HW filter on device team0 [ 182.596167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.607021] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.614947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.623175] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.629700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.658909] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 182.668938] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 182.678969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 182.687323] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 182.694930] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.701346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 182.710810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 182.718897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 182.726928] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.733310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 182.744619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 182.756084] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.764056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.774768] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 182.782486] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.789832] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.797972] device bridge_slave_0 entered promiscuous mode [ 182.805116] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.811904] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.819048] device bridge_slave_1 entered promiscuous mode [ 182.833664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 182.852746] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 182.867822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.882288] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 182.893085] 8021q: adding VLAN 0 to HW filter on device bond0 [ 182.903653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.912033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 182.922638] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 182.932788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 182.949568] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 182.957924] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 182.967530] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 182.986459] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 182.997567] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.006765] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.013928] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.022640] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.030611] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 183.038443] team0: Port device team_slave_0 added [ 183.049031] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.060475] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 183.069037] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.076091] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.084107] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.091830] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.099240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.109610] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 183.117814] team0: Port device team_slave_1 added [ 183.123782] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 183.132544] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.140190] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 183.149491] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 183.155574] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.164486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 183.179742] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.188021] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.195509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.203309] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.213276] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 183.222850] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 183.241159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.248773] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.256090] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.265042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.273649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.286414] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.294826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.358571] device hsr_slave_0 entered promiscuous mode [ 183.397068] device hsr_slave_1 entered promiscuous mode [ 183.458210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 183.465217] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 183.472197] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.480574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.488315] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.494725] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.501682] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.509585] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.522351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.530671] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 183.544668] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 183.552138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 183.559748] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 183.567404] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.574590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.583338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.591009] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.597398] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.606436] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.615029] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 183.634114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 183.642012] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 183.651667] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.662303] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 183.679812] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 183.691202] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.700461] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 183.710641] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 183.719375] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 183.727942] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 183.734283] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.745181] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.752357] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 183.762392] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 183.771394] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 183.777918] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.785878] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 183.793546] 8021q: adding VLAN 0 to HW filter on device team0 [ 183.800173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.809835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.823291] audit: type=1400 audit(1568641012.297:38): avc: denied { associate } for pid=7487 comm="syz-executor.1" name="syz1" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 183.828062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 183.857366] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.867236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 183.875013] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 183.892488] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.900978] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.908794] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.915120] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.922954] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 183.930129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 183.939512] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 183.951724] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 183.963269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 183.985956] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 183.994826] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 184.003755] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 184.011456] bridge0: port 1(bridge_slave_0) entered blocking state [ 184.017916] bridge0: port 1(bridge_slave_0) entered forwarding state [ 184.025352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 184.037989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.051624] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 184.075880] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.084087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.085145] 9pnet: Insufficient options for proto=fd [ 184.097877] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.104382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.113925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 184.143916] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 184.170556] bridge0: port 2(bridge_slave_1) entered blocking state [ 184.176471] 9pnet: Insufficient options for proto=fd [ 184.177129] bridge0: port 2(bridge_slave_1) entered forwarding state [ 184.179822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.201383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.212577] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 184.224495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 184.236400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 13:36:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=fd,', {'\x02\x00\x00\x00o'}, 0x2c, {'wfdno'}}) 13:36:52 executing program 0: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x80, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000540)={0x0, 0x7b5d, 0x0, 0x1}) openat$rtc(0xffffffffffffff9c, 0x0, 0x20000, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) setuid(0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r2 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x102002700) fcntl$addseals(r1, 0x409, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) [ 184.244820] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 184.253649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 184.264721] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.297407] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.308043] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 184.315666] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 184.332239] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 184.350717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.375138] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.385409] 9pnet: Insufficient options for proto=fd [ 184.393754] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 13:36:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=fd,', {'\x02\x00\x00\x00o'}, 0x2c, {'wfdno'}}) [ 184.415212] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.420371] hrtimer: interrupt took 27163 ns [ 184.424579] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.450784] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.472238] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 184.482802] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.508990] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.533409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.549892] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.560791] 9pnet: Insufficient options for proto=fd [ 184.567207] 8021q: adding VLAN 0 to HW filter on device bond0 [ 184.575792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 13:36:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") syz_mount_image$hfsplus(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000100)={'trans=fd,', {'\x02\x00\x00\x00o'}, 0x2c, {'wfdno'}}) [ 184.586346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 184.598182] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 184.612597] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 184.639705] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 184.652129] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 184.668461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 184.676063] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 184.685865] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 184.693954] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.701703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.709784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 184.717494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.725270] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 184.737553] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 184.743680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.763166] 9pnet: Insufficient options for proto=fd [ 184.767334] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 184.778866] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 13:36:53 executing program 1: [ 184.796016] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 184.803520] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 184.811064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 184.819052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 184.835011] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 13:36:53 executing program 1: [ 184.860713] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 184.872914] 8021q: adding VLAN 0 to HW filter on device team0 [ 184.885617] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 184.900129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 13:36:53 executing program 1: [ 184.916126] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 184.932071] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 184.941299] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 184.953690] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 184.965418] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 13:36:53 executing program 1: [ 185.009344] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.036955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 185.044756] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 185.066312] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.072783] bridge0: port 1(bridge_slave_0) entered forwarding state [ 185.086495] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.096715] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 185.105115] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.130602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 185.142879] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 185.158395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 185.166439] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.172859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 185.184160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 185.211039] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.236891] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 185.258343] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 185.276332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 185.304951] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 185.329112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 185.344272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 185.359089] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 185.374932] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 185.391829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 13:36:53 executing program 2: 13:36:53 executing program 0: 13:36:53 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000340)={0x43, 0x9, 0x0, {0x0, 0x40, 0x0, 0x8000, 0x0, 0x7, 0x102, 0x3, 0x80}}, 0x43) sendmsg(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00fb389763355ec18966d358049a4aafebd54939ae42f4b4f0ce363092b619c2c309a060111ba358466086d514bba43e88"], 0x1, 0x1) r2 = socket$inet(0x10, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0xfffffe74) shutdown(r0, 0x2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xb55) write$char_usb(0xffffffffffffffff, &(0x7f0000000000), 0x0) poll(&(0x7f00000001c0)=[{r3, 0x2000}, {r4, 0x404}, {r2, 0x8000}, {r5, 0x2000}, {0xffffffffffffffff, 0x100}], 0x5, 0xd3e) [ 185.404676] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 185.422111] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 185.432442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 185.450714] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 185.484947] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 185.504829] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 185.513420] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 185.537504] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 185.551284] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 185.594926] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 185.614125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 185.732974] [ 185.734643] ======================================================== [ 185.741128] WARNING: possible irq lock inversion dependency detected [ 185.747702] 4.19.73 #0 Not tainted [ 185.751234] -------------------------------------------------------- [ 185.757718] kworker/1:3/7495 just changed the state of lock: [ 185.763509] 0000000069b06a5b (&(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x490 [ 185.772281] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 185.779108] (&fiq->waitq){+.+.} [ 185.779122] [ 185.779122] [ 185.779122] and interrupts could create inverse lock ordering between them. [ 185.779122] [ 185.794008] [ 185.794008] other info that might help us debug this: [ 185.800674] Possible interrupt unsafe locking scenario: [ 185.800674] [ 185.809157] CPU0 CPU1 [ 185.813812] ---- ---- [ 185.818467] lock(&fiq->waitq); [ 185.821834] local_irq_disable(); [ 185.827884] lock(&(&ctx->ctx_lock)->rlock); [ 185.834897] lock(&fiq->waitq); [ 185.840776] [ 185.843518] lock(&(&ctx->ctx_lock)->rlock); [ 185.848195] [ 185.848195] *** DEADLOCK *** [ 185.848195] [ 185.854263] 6 locks held by kworker/1:3/7495: [ 185.858829] #0: 00000000137e91cf ((wq_completion)"%s"("ipv6_addrconf")){+.+.}, at: process_one_work+0x87e/0x1750 [ 185.869232] #1: 0000000070a7bef0 ((work_completion)(&(&ifa->dad_work)->work)){+.+.}, at: process_one_work+0x8b4/0x1750 [ 185.880152] #2: 00000000c7156ccb (rtnl_mutex){+.+.}, at: rtnl_lock+0x17/0x20 [ 185.887455] #3: 000000004060b0c9 (rcu_read_lock){....}, at: ndisc_send_skb+0x80f/0x1460 [ 185.895728] #4: 00000000807fe5c1 (rcu_callback){....}, at: rcu_process_callbacks+0xc79/0x1a30 [ 185.904477] #5: 000000005edd5db1 (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1ca/0x540 [ 185.914630] [ 185.914630] the shortest dependencies between 2nd lock and 1st lock: [ 185.922632] -> (&fiq->waitq){+.+.} ops: 13 { [ 185.927139] HARDIRQ-ON-W at: [ 185.930506] lock_acquire+0x16f/0x3f0 [ 185.936122] _raw_spin_lock+0x2f/0x40 [ 185.941794] flush_bg_queue+0x1f3/0x3d0 [ 185.947616] fuse_request_send_background_locked+0x26d/0x4e0 [ 185.955344] fuse_request_send_background+0x12b/0x180 [ 185.962350] cuse_channel_open+0x5ba/0x830 [ 185.968531] misc_open+0x395/0x4c0 [ 185.973879] chrdev_open+0x245/0x6b0 [ 185.979516] do_dentry_open+0x4c3/0x1210 [ 185.985381] vfs_open+0xa0/0xd0 [ 185.990478] path_openat+0x10d7/0x45e0 [ 185.996172] do_filp_open+0x1a1/0x280 [ 186.001782] do_sys_open+0x3fe/0x550 [ 186.007318] __x64_sys_openat+0x9d/0x100 [ 186.013191] do_syscall_64+0xfd/0x620 [ 186.018804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.025812] SOFTIRQ-ON-W at: [ 186.029170] lock_acquire+0x16f/0x3f0 [ 186.034792] _raw_spin_lock+0x2f/0x40 [ 186.040404] flush_bg_queue+0x1f3/0x3d0 [ 186.046194] fuse_request_send_background_locked+0x26d/0x4e0 [ 186.053806] fuse_request_send_background+0x12b/0x180 [ 186.060846] cuse_channel_open+0x5ba/0x830 [ 186.066901] misc_open+0x395/0x4c0 [ 186.072254] chrdev_open+0x245/0x6b0 [ 186.077779] do_dentry_open+0x4c3/0x1210 [ 186.083654] vfs_open+0xa0/0xd0 [ 186.088743] path_openat+0x10d7/0x45e0 [ 186.094437] do_filp_open+0x1a1/0x280 [ 186.100053] do_sys_open+0x3fe/0x550 [ 186.105579] __x64_sys_openat+0x9d/0x100 [ 186.111449] do_syscall_64+0xfd/0x620 [ 186.117059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.124056] INITIAL USE at: [ 186.127320] lock_acquire+0x16f/0x3f0 [ 186.132838] _raw_spin_lock+0x2f/0x40 [ 186.138362] flush_bg_queue+0x1f3/0x3d0 [ 186.144068] fuse_request_send_background_locked+0x26d/0x4e0 [ 186.151582] fuse_request_send_background+0x12b/0x180 [ 186.158497] cuse_channel_open+0x5ba/0x830 [ 186.164457] misc_open+0x395/0x4c0 [ 186.169716] chrdev_open+0x245/0x6b0 [ 186.175161] do_dentry_open+0x4c3/0x1210 [ 186.180947] vfs_open+0xa0/0xd0 [ 186.185957] path_openat+0x10d7/0x45e0 [ 186.191585] do_filp_open+0x1a1/0x280 [ 186.197256] do_sys_open+0x3fe/0x550 [ 186.202705] __x64_sys_openat+0x9d/0x100 [ 186.208534] do_syscall_64+0xfd/0x620 [ 186.214065] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.220973] } [ 186.222853] ... key at: [] __key.42213+0x0/0x40 [ 186.229667] ... acquired at: [ 186.232845] _raw_spin_lock+0x2f/0x40 [ 186.236807] io_submit_one+0xef2/0x2eb0 [ 186.240945] __x64_sys_io_submit+0x1aa/0x520 [ 186.245534] do_syscall_64+0xfd/0x620 [ 186.249494] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.254829] [ 186.256440] -> (&(&ctx->ctx_lock)->rlock){..-.} ops: 2 { [ 186.261880] IN-SOFTIRQ-W at: [ 186.265149] lock_acquire+0x16f/0x3f0 [ 186.270599] _raw_spin_lock_irq+0x60/0x80 [ 186.276379] free_ioctx_users+0x2d/0x490 [ 186.282085] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 186.289166] rcu_process_callbacks+0xba0/0x1a30 [ 186.295468] __do_softirq+0x25c/0x921 [ 186.300898] do_softirq_own_stack+0x2a/0x40 [ 186.306849] do_softirq.part.0+0x11a/0x170 [ 186.312717] __local_bh_enable_ip+0x211/0x270 [ 186.318846] ip6_finish_output2+0xbd2/0x2550 [ 186.324884] ip6_finish_output+0x574/0xbe0 [ 186.330747] ip6_output+0x235/0x7c0 [ 186.336002] ndisc_send_skb+0xf3b/0x1460 [ 186.341701] ndisc_send_rs+0x134/0x6d0 [ 186.347228] addrconf_dad_completed+0x32e/0xbb0 [ 186.355266] addrconf_dad_work+0x780/0x1150 [ 186.361222] process_one_work+0x989/0x1750 [ 186.367092] worker_thread+0x98/0xe40 [ 186.372535] kthread+0x354/0x420 [ 186.377536] ret_from_fork+0x24/0x30 [ 186.382882] INITIAL USE at: [ 186.386057] lock_acquire+0x16f/0x3f0 [ 186.391409] _raw_spin_lock_irq+0x60/0x80 [ 186.397106] io_submit_one+0xead/0x2eb0 [ 186.402733] __x64_sys_io_submit+0x1aa/0x520 [ 186.408695] do_syscall_64+0xfd/0x620 [ 186.414053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.420781] } [ 186.422570] ... key at: [] __key.50213+0x0/0x40 [ 186.429299] ... acquired at: [ 186.432402] mark_lock+0x420/0x1370 [ 186.436181] __lock_acquire+0xc62/0x49c0 [ 186.440395] lock_acquire+0x16f/0x3f0 [ 186.444361] _raw_spin_lock_irq+0x60/0x80 [ 186.448671] free_ioctx_users+0x2d/0x490 [ 186.452885] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 186.458510] rcu_process_callbacks+0xba0/0x1a30 [ 186.463340] __do_softirq+0x25c/0x921 [ 186.467296] do_softirq_own_stack+0x2a/0x40 [ 186.471780] do_softirq.part.0+0x11a/0x170 [ 186.476169] __local_bh_enable_ip+0x211/0x270 [ 186.480834] ip6_finish_output2+0xbd2/0x2550 [ 186.485396] ip6_finish_output+0x574/0xbe0 [ 186.489787] ip6_output+0x235/0x7c0 [ 186.493568] ndisc_send_skb+0xf3b/0x1460 [ 186.497788] ndisc_send_rs+0x134/0x6d0 [ 186.501854] addrconf_dad_completed+0x32e/0xbb0 [ 186.506685] addrconf_dad_work+0x780/0x1150 [ 186.511179] process_one_work+0x989/0x1750 [ 186.515573] worker_thread+0x98/0xe40 [ 186.519528] kthread+0x354/0x420 [ 186.523048] ret_from_fork+0x24/0x30 [ 186.526910] [ 186.528513] [ 186.528513] stack backtrace: [ 186.532995] CPU: 1 PID: 7495 Comm: kworker/1:3 Not tainted 4.19.73 #0 [ 186.539566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.548918] Workqueue: ipv6_addrconf addrconf_dad_work [ 186.554174] Call Trace: [ 186.556739] [ 186.558880] dump_stack+0x172/0x1f0 [ 186.562502] print_irq_inversion_bug.part.0+0x2c0/0x2cd [ 186.567846] check_usage_forwards.cold+0x20/0x29 [ 186.572607] ? check_usage_backwards+0x340/0x340 [ 186.577357] ? save_stack_trace+0x1a/0x20 [ 186.581494] ? save_trace+0xe0/0x290 [ 186.585188] mark_lock+0x420/0x1370 [ 186.588800] ? check_usage_backwards+0x340/0x340 [ 186.593536] __lock_acquire+0xc62/0x49c0 [ 186.597583] ? mark_held_locks+0x100/0x100 [ 186.601807] ? mark_held_locks+0x100/0x100 [ 186.606022] ? __wake_up_common_lock+0xfe/0x190 [ 186.610672] ? mark_held_locks+0x100/0x100 [ 186.614886] ? __wake_up_common_lock+0xfe/0x190 [ 186.619559] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 186.624650] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 186.629236] ? trace_hardirqs_on+0x67/0x220 [ 186.633537] ? kasan_check_read+0x11/0x20 [ 186.637677] lock_acquire+0x16f/0x3f0 [ 186.641482] ? free_ioctx_users+0x2d/0x490 [ 186.645698] _raw_spin_lock_irq+0x60/0x80 [ 186.649826] ? free_ioctx_users+0x2d/0x490 [ 186.654041] free_ioctx_users+0x2d/0x490 [ 186.658098] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 186.663278] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 186.668721] ? percpu_ref_exit+0xd0/0xd0 [ 186.672762] rcu_process_callbacks+0xba0/0x1a30 [ 186.677423] ? __rcu_read_unlock+0x170/0x170 [ 186.681824] ? __lock_is_held+0xb6/0x140 [ 186.685882] __do_softirq+0x25c/0x921 [ 186.689672] ? rcu_nmi_exit+0x73/0x140 [ 186.693543] ? ip6_finish_output2+0xb9f/0x2550 [ 186.698304] do_softirq_own_stack+0x2a/0x40 [ 186.702611] [ 186.704857] do_softirq.part.0+0x11a/0x170 [ 186.709078] __local_bh_enable_ip+0x211/0x270 [ 186.713555] ip6_finish_output2+0xbd2/0x2550 [ 186.717955] ? ip6_forward_finish+0x4d0/0x4d0 [ 186.722452] ? lock_downgrade+0x810/0x810 [ 186.726605] ? kasan_check_read+0x11/0x20 [ 186.730737] ip6_finish_output+0x574/0xbe0 [ 186.734955] ? ip6_finish_output+0x574/0xbe0 [ 186.739345] ip6_output+0x235/0x7c0 [ 186.742954] ? ip6_finish_output+0xbe0/0xbe0 [ 186.747360] ? ip6_fragment+0x3770/0x3770 [ 186.751501] ndisc_send_skb+0xf3b/0x1460 [ 186.755543] ? nf_hook.constprop.0+0x560/0x560 [ 186.760114] ? memcpy+0x46/0x50 [ 186.763457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.768981] ndisc_send_rs+0x134/0x6d0 [ 186.772902] addrconf_dad_completed+0x32e/0xbb0 [ 186.777650] ? addrconf_rs_timer+0x680/0x680 [ 186.782049] ? addrconf_dad_work+0x76c/0x1150 [ 186.786533] ? addrconf_dad_work+0x76c/0x1150 [ 186.791043] addrconf_dad_work+0x780/0x1150 [ 186.795358] ? addrconf_dad_work+0x780/0x1150 [ 186.799847] ? addrconf_dad_completed+0xbb0/0xbb0 [ 186.804678] process_one_work+0x989/0x1750 [ 186.808898] ? pwq_dec_nr_in_flight+0x320/0x320 [ 186.813562] ? lock_acquire+0x16f/0x3f0 [ 186.817534] ? kasan_check_write+0x14/0x20 [ 186.821761] ? do_raw_spin_lock+0xc8/0x240 [ 186.825995] worker_thread+0x98/0xe40 [ 186.829791] ? trace_hardirqs_on+0x67/0x220 [ 186.834108] kthread+0x354/0x420 13:36:55 executing program 5: 13:36:55 executing program 4: 13:36:55 executing program 3: 13:36:55 executing program 0: 13:36:55 executing program 2: [ 186.837905] ? process_one_work+0x1750/0x1750 [ 186.842395] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 186.847929] ret_from_fork+0x24/0x30 13:36:55 executing program 5: 13:36:55 executing program 4: 13:36:55 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000340)={0x43, 0x9, 0x0, {0x0, 0x40, 0x0, 0x8000, 0x0, 0x7, 0x102, 0x3, 0x80}}, 0x43) sendmsg(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00fb389763355ec18966d358049a4aafebd54939ae42f4b4f0ce363092b619c2c309a060111ba358466086d514bba43e88"], 0x1, 0x1) r2 = socket$inet(0x10, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0xfffffe74) shutdown(r0, 0x2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xb55) write$char_usb(0xffffffffffffffff, &(0x7f0000000000), 0x0) poll(&(0x7f00000001c0)=[{r3, 0x2000}, {r4, 0x404}, {r2, 0x8000}, {r5, 0x2000}, {0xffffffffffffffff, 0x100}], 0x5, 0xd3e) [ 186.893904] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 186.919065] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:36:55 executing program 0: syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$zero(0xffffffffffffff9c, 0x0, 0x1, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000340)={0x43, 0x9, 0x0, {0x0, 0x40, 0x0, 0x8000, 0x0, 0x7, 0x102, 0x3, 0x80}}, 0x43) sendmsg(0xffffffffffffffff, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00fb389763355ec18966d358049a4aafebd54939ae42f4b4f0ce363092b619c2c309a060111ba358466086d514bba43e88"], 0x1, 0x1) r2 = socket$inet(0x10, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000400)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x0) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x8001, 0x0, 0xfffffe74) shutdown(r0, 0x2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r4, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xb55) write$char_usb(0xffffffffffffffff, &(0x7f0000000000), 0x0) poll(&(0x7f00000001c0)=[{r3, 0x2000}, {r4, 0x404}, {r2, 0x8000}, {r5, 0x2000}, {0xffffffffffffffff, 0x100}], 0x5, 0xd3e) 13:36:55 executing program 2: 13:36:55 executing program 3: [ 186.969776] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 186.997020] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 187.007947] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env 13:36:55 executing program 4: 13:36:55 executing program 5: [ 187.014560] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 187.034548] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 187.045568] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 187.057614] kobject: 'loop0' (00000000d515af63): kobject_uevent_env 13:36:55 executing program 2: 13:36:55 executing program 5: [ 187.064169] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 187.075104] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 187.081825] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 187.092029] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 187.099410] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 187.127394] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env 13:36:55 executing program 3: 13:36:55 executing program 4: 13:36:55 executing program 5: 13:36:55 executing program 2: [ 187.197845] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 187.278994] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 187.287959] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 187.326497] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 187.333500] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 187.348605] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 187.355100] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 187.365399] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 187.372069] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 187.381929] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 187.388677] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 187.398517] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 187.404943] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 187.417316] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 187.423784] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:36:56 executing program 1: 13:36:56 executing program 0: 13:36:56 executing program 3: 13:36:56 executing program 4: 13:36:56 executing program 2: 13:36:56 executing program 5: [ 187.797109] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 187.803588] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:36:56 executing program 3: 13:36:56 executing program 2: 13:36:56 executing program 4: 13:36:56 executing program 1: 13:36:56 executing program 5: [ 187.853821] kobject: 'loop0' (00000000d515af63): kobject_uevent_env 13:36:56 executing program 3: 13:36:56 executing program 1: 13:36:56 executing program 0: [ 187.908641] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:36:56 executing program 2: 13:36:56 executing program 4: 13:36:56 executing program 5: [ 187.949986] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 187.966302] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:36:56 executing program 3: 13:36:56 executing program 1: 13:36:56 executing program 4: [ 188.005532] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 188.027759] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 188.043929] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env 13:36:56 executing program 2: 13:36:56 executing program 0: 13:36:56 executing program 5: 13:36:56 executing program 1: 13:36:56 executing program 2: [ 188.050968] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:36:56 executing program 3: 13:36:56 executing program 0: 13:36:56 executing program 4: 13:36:56 executing program 3: [ 188.100018] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 188.115968] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:36:56 executing program 5: 13:36:56 executing program 2: 13:36:56 executing program 4: 13:36:56 executing program 0: 13:36:56 executing program 5: [ 188.152750] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 188.168827] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:36:56 executing program 1: 13:36:56 executing program 4: 13:36:56 executing program 3: [ 188.199498] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env 13:36:56 executing program 2: 13:36:56 executing program 1: 13:36:56 executing program 0: [ 188.238129] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' 13:36:56 executing program 5: 13:36:56 executing program 3: 13:36:56 executing program 2: 13:36:56 executing program 4: [ 188.278824] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 188.285296] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' 13:36:56 executing program 5: 13:36:56 executing program 3: 13:36:56 executing program 0: 13:36:56 executing program 1: [ 188.330089] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 188.336564] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:36:56 executing program 2: 13:36:56 executing program 4: 13:36:56 executing program 3: 13:36:56 executing program 1: 13:36:56 executing program 0: 13:36:56 executing program 5: [ 188.389608] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 188.412433] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:36:56 executing program 2: 13:36:56 executing program 4: 13:36:56 executing program 0: 13:36:56 executing program 3: [ 188.451750] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 188.461623] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:36:56 executing program 1: 13:36:57 executing program 4: 13:36:57 executing program 5: 13:36:57 executing program 2: 13:36:57 executing program 0: 13:36:57 executing program 3: 13:36:57 executing program 1: [ 188.509043] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 188.515637] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 188.533110] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 188.549326] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:36:57 executing program 4: 13:36:57 executing program 5: 13:36:57 executing program 3: 13:36:57 executing program 1: 13:36:57 executing program 2: 13:36:57 executing program 4: 13:36:57 executing program 0: [ 188.594883] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 188.627900] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' 13:36:57 executing program 5: 13:36:57 executing program 2: 13:36:57 executing program 4: 13:36:57 executing program 3: 13:36:57 executing program 1: [ 188.657771] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 188.676444] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' 13:36:57 executing program 0: 13:36:57 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 13:36:57 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setns(r0, 0x0) 13:36:57 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') 13:36:57 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(0xffffffffffffffff, r0) syz_open_dev$evdev(0x0, 0x1, 0x40) dup(0xffffffffffffffff) 13:36:57 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 188.728350] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 188.744742] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 188.770529] kobject: 'loop3' (00000000845db23b): kobject_uevent_env 13:36:57 executing program 0: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 13:36:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RRENAME(r1, 0x0, 0x0) [ 188.789527] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 188.811914] kobject: 'ppp0' (0000000054728755): kobject_add_internal: parent: 'net', set: 'devices' [ 188.822044] kobject: 'loop0' (00000000d515af63): kobject_uevent_env 13:36:57 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 188.838177] ptrace attach of "/root/syz-executor.1"[7724] was attempted by "/root/syz-executor.1"[7725] [ 188.843343] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 188.852754] kobject: 'ppp0' (0000000054728755): kobject_uevent_env [ 188.860471] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 188.864394] kobject: 'ppp0' (0000000054728755): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 188.870541] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 188.892635] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 188.895034] kobject: 'queues' (00000000b2603b60): kobject_add_internal: parent: 'ppp0', set: '' [ 188.899694] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 188.918388] ptrace attach of "/root/syz-executor.1"[7734] was attempted by "/root/syz-executor.1"[7735] [ 188.924579] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 188.928498] kobject: 'queues' (00000000b2603b60): kobject_uevent_env 13:36:57 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 188.935002] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 188.942243] kobject: 'queues' (00000000b2603b60): kobject_uevent_env: filter function caused the event to drop! [ 188.953429] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 188.970192] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 188.970932] kobject: 'rx-0' (0000000030b93449): kobject_add_internal: parent: 'queues', set: 'queues' [ 188.983730] ptrace attach of "/root/syz-executor.1"[7737] was attempted by "/root/syz-executor.1"[7738] [ 188.994473] kobject: 'rx-0' (0000000030b93449): kobject_uevent_env [ 189.002317] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.006561] kobject: 'rx-0' (0000000030b93449): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 189.012720] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.025728] kobject: 'tx-0' (00000000f885c0bc): kobject_add_internal: parent: 'queues', set: 'queues' 13:36:57 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 189.033750] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.049017] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.053579] kobject: 'tx-0' (00000000f885c0bc): kobject_uevent_env [ 189.059073] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.070224] kobject: 'tx-0' (00000000f885c0bc): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 189.071788] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.088060] ptrace attach of "/root/syz-executor.1"[7741] was attempted by "/root/syz-executor.1"[7742] [ 189.091639] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.107676] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.117871] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 189.124558] kobject: '' (000000000918af55): kobject_add_internal: parent: 'net', set: 'devices' [ 189.134177] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' 13:36:57 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setns(r0, 0x0) 13:36:57 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) [ 189.141971] kobject: '' (000000000918af55): kobject_uevent_env [ 189.144433] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.158254] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.163341] kobject: '' (000000000918af55): fill_kobj_path: path = '/devices/virtual/net/' [ 189.173709] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.179920] kobject: 'queues' (00000000520e6a33): kobject_add_internal: parent: '', set: '' [ 189.188729] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.197059] ptrace attach of "/root/syz-executor.1"[7746] was attempted by "/root/syz-executor.1"[7747] [ 189.206368] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.217419] kobject: 'queues' (00000000520e6a33): kobject_uevent_env [ 189.222281] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.228228] kobject: 'queues' (00000000520e6a33): kobject_uevent_env: filter function caused the event to drop! [ 189.236747] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.252511] kobject: 'rx-0' (000000001a44e373): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.255314] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.267187] kobject: 'rx-0' (000000001a44e373): kobject_uevent_env [ 189.274059] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.278173] kobject: 'rx-0' (000000001a44e373): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 189.284359] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.294658] kobject: 'tx-0' (00000000c0e6486b): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.306367] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.313864] kobject: 'tx-0' (00000000c0e6486b): kobject_uevent_env [ 189.322294] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.326795] kobject: 'tx-0' (00000000c0e6486b): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 189.336242] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.347628] kobject: 'ppp0' (0000000032b90ad6): kobject_add_internal: parent: 'net', set: 'devices' [ 189.354273] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.369586] kobject: 'ppp0' (0000000032b90ad6): kobject_uevent_env [ 189.377840] kobject: 'ppp0' (0000000032b90ad6): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 189.379229] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 189.391669] kobject: 'queues' (000000004eb5abc4): kobject_add_internal: parent: 'ppp0', set: '' [ 189.394112] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 189.403752] kobject: 'queues' (000000004eb5abc4): kobject_uevent_env [ 189.415355] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.419990] kobject: 'queues' (000000004eb5abc4): kobject_uevent_env: filter function caused the event to drop! [ 189.426143] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.436825] kobject: 'rx-0' (000000005bd93752): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.448569] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.456194] kobject: 'rx-0' (000000005bd93752): kobject_uevent_env [ 189.462232] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.468707] kobject: 'rx-0' (000000005bd93752): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 189.480524] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.480551] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.480857] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.480882] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.481276] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 189.481301] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 189.483779] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.494926] kobject: 'tx-0' (000000000920ee01): kobject_add_internal: parent: 'queues', set: 'queues' [ 189.502472] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.511615] kobject: 'tx-0' (000000000920ee01): kobject_uevent_env [ 189.519091] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.526551] kobject: 'tx-0' (000000000920ee01): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 189.532697] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.600305] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.600733] kobject: 'rx-0' (000000005bd93752): kobject_cleanup, parent 000000004eb5abc4 [ 189.609207] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.615407] kobject: 'rx-0' (000000005bd93752): auto cleanup 'remove' event [ 189.625515] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.632442] kobject: 'rx-0' (000000005bd93752): kobject_uevent_env [ 189.641358] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.645335] kobject: 'rx-0' (000000005bd93752): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 189.656318] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.665783] kobject: 'rx-0' (000000005bd93752): auto cleanup kobject_del [ 189.674235] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.679069] kobject: 'rx-0' (000000005bd93752): calling ktype release [ 189.689071] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.695110] kobject: 'rx-0': free name [ 189.704552] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.706269] kobject: 'tx-0' (000000000920ee01): kobject_cleanup, parent 000000004eb5abc4 [ 189.718190] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 189.724182] kobject: 'tx-0' (000000000920ee01): auto cleanup 'remove' event [ 189.730726] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 189.737738] kobject: 'tx-0' (000000000920ee01): kobject_uevent_env [ 189.749784] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.753563] kobject: 'tx-0' (000000000920ee01): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 189.760204] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.770257] kobject: 'tx-0' (000000000920ee01): auto cleanup kobject_del [ 189.782472] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.787428] kobject: 'tx-0' (000000000920ee01): calling ktype release [ 189.794434] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.800534] kobject: 'tx-0': free name [ 189.800558] kobject: 'queues' (000000004eb5abc4): kobject_cleanup, parent (null) [ 189.812489] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.814301] kobject: 'queues' (000000004eb5abc4): calling ktype release [ 189.822517] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.833083] kobject: 'queues' (000000004eb5abc4): kset_release [ 189.842072] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 189.849496] kobject: 'queues': free name [ 189.855176] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 189.862093] kobject: 'ppp0' (0000000032b90ad6): kobject_uevent_env [ 189.868096] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 189.875502] kobject: 'ppp0' (0000000032b90ad6): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 189.884266] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 189.907544] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 189.914412] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 189.915045] kobject: 'rx-0' (0000000030b93449): kobject_cleanup, parent 00000000b2603b60 [ 189.924630] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 189.934737] kobject: 'rx-0' (0000000030b93449): auto cleanup 'remove' event [ 189.939438] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 189.946137] kobject: 'rx-0' (0000000030b93449): kobject_uevent_env [ 189.961521] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 189.962301] kobject: 'rx-0' (0000000030b93449): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 189.968785] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 189.979125] kobject: 'rx-0' (0000000030b93449): auto cleanup kobject_del [ 189.990943] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 189.995305] kobject: 'rx-0' (0000000030b93449): calling ktype release [ 190.001840] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 190.008771] kobject: 'rx-0': free name [ 190.020841] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 190.022230] kobject: 'tx-0' (00000000f885c0bc): kobject_cleanup, parent 00000000b2603b60 [ 190.028973] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 190.036962] kobject: 'tx-0' (00000000f885c0bc): auto cleanup 'remove' event [ 190.049033] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 190.053565] kobject: 'tx-0' (00000000f885c0bc): kobject_uevent_env [ 190.062180] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 190.066343] kobject: 'tx-0' (00000000f885c0bc): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 190.076738] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 190.086030] kobject: 'tx-0' (00000000f885c0bc): auto cleanup kobject_del [ 190.094413] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 190.099452] kobject: 'tx-0' (00000000f885c0bc): calling ktype release [ 190.109690] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 190.115647] kobject: 'tx-0': free name [ 190.123879] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 190.126017] kobject: 'queues' (00000000b2603b60): kobject_cleanup, parent (null) [ 190.135733] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 190.144016] kobject: 'queues' (00000000b2603b60): calling ktype release [ 190.152147] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 190.157214] kobject: 'queues' (00000000b2603b60): kset_release [ 190.166989] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 190.172515] kobject: 'queues': free name [ 190.181083] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 190.183230] kobject: 'ppp0' (0000000054728755): kobject_uevent_env [ 190.193064] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 190.198975] kobject: 'ppp0' (0000000054728755): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 190.208694] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 190.236377] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 190.244069] kobject: 'rx-0' (000000001a44e373): kobject_cleanup, parent 00000000520e6a33 [ 190.245508] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 190.252744] kobject: 'rx-0' (000000001a44e373): auto cleanup 'remove' event [ 190.264326] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 190.269260] kobject: 'rx-0' (000000001a44e373): kobject_uevent_env [ 190.275546] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 190.282021] kobject: 'rx-0' (000000001a44e373): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 190.291829] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 190.303288] kobject: 'rx-0' (000000001a44e373): auto cleanup kobject_del [ 190.308073] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 190.314816] kobject: 'rx-0' (000000001a44e373): calling ktype release [ 190.325744] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 190.332827] kobject: 'rx-0': free name [ 190.337780] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 190.341574] kobject: 'tx-0' (00000000c0e6486b): kobject_cleanup, parent 00000000520e6a33 [ 190.352057] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 190.364099] kobject: 'tx-0' (00000000c0e6486b): auto cleanup 'remove' event [ 190.366214] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 190.380661] kobject: 'tx-0' (00000000c0e6486b): kobject_uevent_env [ 190.382588] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 190.390409] kobject: 'tx-0' (00000000c0e6486b): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 190.395018] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 190.404740] kobject: 'tx-0' (00000000c0e6486b): auto cleanup kobject_del [ 190.414759] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 190.423077] kobject: 'tx-0' (00000000c0e6486b): calling ktype release [ 190.427685] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 190.434326] kobject: 'tx-0': free name [ 190.472688] kobject: 'queues' (00000000520e6a33): kobject_cleanup, parent (null) [ 190.482796] kobject: 'queues' (00000000520e6a33): calling ktype release [ 190.490500] kobject: 'queues' (00000000520e6a33): kset_release [ 190.497124] kobject: 'queues': free name [ 190.512499] kobject: '' (000000000918af55): kobject_uevent_env [ 190.536926] kobject: '' (000000000918af55): fill_kobj_path: path = '/devices/virtual/net/' [ 190.561662] kobject: 'ppp0' (0000000032b90ad6): kobject_cleanup, parent (null) [ 190.563983] kobject: 'ppp0' (0000000054728755): kobject_cleanup, parent (null) [ 190.578376] kobject: 'ppp0' (0000000032b90ad6): calling ktype release [ 190.581151] kobject: 'ppp0' (0000000054728755): calling ktype release [ 190.585792] kobject: 'ppp0': free name [ 190.592600] kobject: 'ppp0': free name [ 190.606877] kobject: '' (000000000918af55): kobject_cleanup, parent (null) [ 190.614871] kobject: '' (000000000918af55): calling ktype release [ 190.625055] kobject: '': free name [ 190.632790] kobject: 'ppp0' (00000000e1005944): kobject_add_internal: parent: 'net', set: 'devices' [ 190.651291] kobject: 'ppp0' (00000000e1005944): kobject_uevent_env [ 190.658053] kobject: 'ppp0' (00000000e1005944): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 190.719551] kobject: 'queues' (00000000bddb996f): kobject_add_internal: parent: 'ppp0', set: '' [ 190.793313] kobject: 'queues' (00000000bddb996f): kobject_uevent_env [ 190.832015] kobject: 'queues' (00000000bddb996f): kobject_uevent_env: filter function caused the event to drop! [ 190.879839] kobject: 'rx-0' (00000000740a66be): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.918739] kobject: 'rx-0' (00000000740a66be): kobject_uevent_env [ 190.925146] kobject: 'rx-0' (00000000740a66be): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 190.952210] kobject: 'tx-0' (0000000047965be9): kobject_add_internal: parent: 'queues', set: 'queues' [ 190.963516] kobject: 'tx-0' (0000000047965be9): kobject_uevent_env [ 190.970356] kobject: 'tx-0' (0000000047965be9): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 190.989245] kobject: 'ppp0' (0000000020ad8481): kobject_add_internal: parent: 'net', set: 'devices' [ 191.003225] kobject: 'ppp0' (0000000020ad8481): kobject_uevent_env [ 191.017497] kobject: 'ppp0' (0000000020ad8481): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 191.040698] kobject: 'queues' (00000000fc5d702c): kobject_add_internal: parent: 'ppp0', set: '' [ 191.061988] kobject: 'queues' (00000000fc5d702c): kobject_uevent_env [ 191.069497] kobject: 'queues' (00000000fc5d702c): kobject_uevent_env: filter function caused the event to drop! [ 191.080377] kobject: 'rx-0' (00000000f5be2e78): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.090468] kobject: 'rx-0' (00000000f5be2e78): kobject_uevent_env [ 191.097130] kobject: 'rx-0' (00000000f5be2e78): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 191.107688] kobject: 'tx-0' (0000000078fe0b47): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.117799] kobject: 'tx-0' (0000000078fe0b47): kobject_uevent_env [ 191.124209] kobject: 'tx-0' (0000000078fe0b47): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 191.135223] kobject: '' (00000000230e0956): kobject_add_internal: parent: 'net', set: 'devices' [ 191.145658] kobject: '' (00000000230e0956): kobject_uevent_env [ 191.152804] kobject: '' (00000000230e0956): fill_kobj_path: path = '/devices/virtual/net/' [ 191.161537] kobject: 'queues' (000000007ce68e6a): kobject_add_internal: parent: '', set: '' [ 191.170718] kobject: 'queues' (000000007ce68e6a): kobject_uevent_env [ 191.177240] kobject: 'queues' (000000007ce68e6a): kobject_uevent_env: filter function caused the event to drop! [ 191.187633] kobject: 'rx-0' (000000000065ac12): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.197094] kobject: 'rx-0' (000000000065ac12): kobject_uevent_env [ 191.203428] kobject: 'rx-0' (000000000065ac12): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 191.213535] kobject: 'tx-0' (00000000b62e14e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 191.223007] kobject: 'tx-0' (00000000b62e14e8): kobject_uevent_env [ 191.229492] kobject: 'tx-0' (00000000b62e14e8): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 191.240790] kobject: 'rx-0' (000000000065ac12): kobject_cleanup, parent 000000007ce68e6a [ 191.249050] kobject: 'rx-0' (000000000065ac12): auto cleanup 'remove' event [ 191.256128] kobject: 'rx-0' (000000000065ac12): kobject_uevent_env [ 191.262495] kobject: 'rx-0' (000000000065ac12): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 191.272593] kobject: 'rx-0' (000000000065ac12): auto cleanup kobject_del [ 191.279472] kobject: 'rx-0' (000000000065ac12): calling ktype release [ 191.286041] kobject: 'rx-0': free name [ 191.290091] kobject: 'tx-0' (00000000b62e14e8): kobject_cleanup, parent 000000007ce68e6a [ 191.298367] kobject: 'tx-0' (00000000b62e14e8): auto cleanup 'remove' event [ 191.305465] kobject: 'tx-0' (00000000b62e14e8): kobject_uevent_env [ 191.311992] kobject: 'tx-0' (00000000b62e14e8): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 191.321974] kobject: 'tx-0' (00000000b62e14e8): auto cleanup kobject_del [ 191.328883] kobject: 'tx-0' (00000000b62e14e8): calling ktype release [ 191.335460] kobject: 'tx-0': free name [ 191.339403] kobject: 'queues' (000000007ce68e6a): kobject_cleanup, parent (null) [ 191.347832] kobject: 'queues' (000000007ce68e6a): calling ktype release [ 191.354575] kobject: 'queues' (000000007ce68e6a): kset_release [ 191.360566] kobject: 'queues': free name [ 191.364821] kobject: '' (00000000230e0956): kobject_uevent_env [ 191.370932] kobject: '' (00000000230e0956): fill_kobj_path: path = '/devices/virtual/net/' [ 191.380368] kobject: 'rx-0' (00000000740a66be): kobject_cleanup, parent 00000000bddb996f [ 191.388788] kobject: 'rx-0' (00000000740a66be): auto cleanup 'remove' event [ 191.395931] kobject: 'rx-0' (00000000740a66be): kobject_uevent_env [ 191.402437] kobject: 'rx-0' (00000000740a66be): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 191.412810] kobject: 'rx-0' (00000000740a66be): auto cleanup kobject_del [ 191.419695] kobject: 'rx-0' (00000000740a66be): calling ktype release [ 191.426265] kobject: 'rx-0': free name [ 191.430223] kobject: 'tx-0' (0000000047965be9): kobject_cleanup, parent 00000000bddb996f [ 191.438467] kobject: 'tx-0' (0000000047965be9): auto cleanup 'remove' event [ 191.445550] kobject: 'tx-0' (0000000047965be9): kobject_uevent_env [ 191.452049] kobject: 'tx-0' (0000000047965be9): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 191.462252] kobject: 'tx-0' (0000000047965be9): auto cleanup kobject_del [ 191.469212] kobject: 'tx-0' (0000000047965be9): calling ktype release [ 191.475783] kobject: 'tx-0': free name [ 191.479724] kobject: 'queues' (00000000bddb996f): kobject_cleanup, parent (null) [ 191.488142] kobject: 'queues' (00000000bddb996f): calling ktype release [ 191.494874] kobject: 'queues' (00000000bddb996f): kset_release [ 191.500874] kobject: 'queues': free name [ 191.505134] kobject: 'ppp0' (00000000e1005944): kobject_uevent_env [ 191.511513] kobject: 'ppp0' (00000000e1005944): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 191.521517] kobject: 'rx-0' (00000000f5be2e78): kobject_cleanup, parent 00000000fc5d702c [ 191.529829] kobject: 'rx-0' (00000000f5be2e78): auto cleanup 'remove' event [ 191.536970] kobject: 'rx-0' (00000000f5be2e78): kobject_uevent_env [ 191.543308] kobject: 'rx-0' (00000000f5be2e78): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 191.553617] kobject: 'rx-0' (00000000f5be2e78): auto cleanup kobject_del [ 191.560657] kobject: 'rx-0' (00000000f5be2e78): calling ktype release [ 191.567299] kobject: 'rx-0': free name [ 191.571207] kobject: 'tx-0' (0000000078fe0b47): kobject_cleanup, parent 00000000fc5d702c [ 191.579464] kobject: 'tx-0' (0000000078fe0b47): auto cleanup 'remove' event [ 191.586600] kobject: 'tx-0' (0000000078fe0b47): kobject_uevent_env [ 191.592952] kobject: 'tx-0' (0000000078fe0b47): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 191.603169] kobject: 'tx-0' (0000000078fe0b47): auto cleanup kobject_del [ 191.610081] kobject: 'tx-0' (0000000078fe0b47): calling ktype release [ 191.616688] kobject: 'tx-0': free name [ 191.620578] kobject: 'queues' (00000000fc5d702c): kobject_cleanup, parent (null) [ 191.629138] kobject: 'queues' (00000000fc5d702c): calling ktype release [ 191.635894] kobject: 'queues' (00000000fc5d702c): kset_release [ 191.641888] kobject: 'queues': free name [ 191.646385] kobject: 'ppp0' (0000000020ad8481): kobject_uevent_env [ 191.652770] kobject: 'ppp0' (0000000020ad8481): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 191.662046] kobject: '' (00000000230e0956): kobject_cleanup, parent (null) [ 191.662080] kobject: 'ppp0' (00000000e1005944): kobject_cleanup, parent (null) [ 191.672622] kobject: '' (00000000230e0956): calling ktype release [ 191.678333] kobject: 'ppp0' (00000000e1005944): calling ktype release [ 191.684902] kobject: '': free name [ 191.691237] kobject: 'ppp0': free name [ 191.702530] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env 13:37:00 executing program 5: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100, 0x100000001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) 13:37:00 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) tkill(r0, 0x39) 13:37:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RRENAME(r1, 0x0, 0x0) 13:37:00 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RRENAME(r1, 0x0, 0x0) 13:37:00 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(0xffffffffffffffff, r0) syz_open_dev$evdev(0x0, 0x1, 0x40) dup(0xffffffffffffffff) [ 191.706919] kobject: 'ppp0' (0000000020ad8481): kobject_cleanup, parent (null) [ 191.712048] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 191.717432] kobject: 'ppp0' (0000000020ad8481): calling ktype release [ 191.733408] kobject: 'ppp0': free name 13:37:00 executing program 0: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 13:37:00 executing program 2: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(0xffffffffffffffff, r0) syz_open_dev$evdev(0x0, 0x1, 0x40) dup(0xffffffffffffffff) 13:37:00 executing program 3: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) [ 191.763836] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 191.776190] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 191.792257] kobject: 'ppp0' (000000007e96b8d5): kobject_add_internal: parent: 'net', set: 'devices' [ 191.806252] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env 13:37:00 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=0x0, @ANYRES64, @ANYPTR64, @ANYRESHEX], 0x0, 0x36}, 0x20) [ 191.833295] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 191.850020] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 191.857938] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 191.870975] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 191.881213] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 191.891928] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 191.897945] kobject: 'ppp0' (000000007e96b8d5): kobject_uevent_env [ 191.899124] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 191.918128] kobject: 'ppp0' (000000007e96b8d5): fill_kobj_path: path = '/devices/virtual/net/ppp0' 13:37:00 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 191.929473] kobject: 'queues' (00000000e2251632): kobject_add_internal: parent: 'ppp0', set: '' [ 191.934220] ptrace attach of "/root/syz-executor.1"[7849] was attempted by "/root/syz-executor.1"[7850] [ 191.939446] kobject: 'queues' (00000000e2251632): kobject_uevent_env [ 191.956879] kobject: 'queues' (00000000e2251632): kobject_uevent_env: filter function caused the event to drop! [ 191.968351] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 191.968529] kobject: 'rx-0' (0000000059279bc1): kobject_add_internal: parent: 'queues', set: 'queues' 13:37:00 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001400)=ANY=[@ANYBLOB="cd80"], 0x2}}, 0x0) [ 191.976070] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 191.987205] kobject: 'rx-0' (0000000059279bc1): kobject_uevent_env [ 192.002682] kobject: 'rx-0' (0000000059279bc1): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 192.004273] ptrace attach of "/root/syz-executor.1"[7853] was attempted by "/root/syz-executor.1"[7854] [ 192.013649] kobject: 'tx-0' (000000000d1cf245): kobject_add_internal: parent: 'queues', set: 'queues' 13:37:00 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 192.036423] kobject: 'tx-0' (000000000d1cf245): kobject_uevent_env [ 192.043136] kobject: 'tx-0' (000000000d1cf245): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 192.065566] kobject: '' (000000004cd9587f): kobject_add_internal: parent: 'net', set: 'devices' [ 192.077131] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 192.083618] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 192.100894] kobject: '' (000000004cd9587f): kobject_uevent_env [ 192.118234] kobject: '' (000000004cd9587f): fill_kobj_path: path = '/devices/virtual/net/' [ 192.130765] kobject: 'queues' (0000000094141e3e): kobject_add_internal: parent: '', set: '' [ 192.140197] kobject: 'queues' (0000000094141e3e): kobject_uevent_env [ 192.146812] kobject: 'queues' (0000000094141e3e): kobject_uevent_env: filter function caused the event to drop! [ 192.157288] kobject: 'rx-0' (00000000ad746016): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.166853] kobject: 'rx-0' (00000000ad746016): kobject_uevent_env [ 192.173371] kobject: 'rx-0' (00000000ad746016): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 192.183383] kobject: 'tx-0' (0000000056f71056): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.193141] kobject: 'tx-0' (0000000056f71056): kobject_uevent_env [ 192.199530] kobject: 'tx-0' (0000000056f71056): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 192.210245] kobject: '' (000000003315c38c): kobject_add_internal: parent: 'net', set: 'devices' [ 192.222307] kobject: '' (000000003315c38c): kobject_uevent_env [ 192.228489] kobject: '' (000000003315c38c): fill_kobj_path: path = '/devices/virtual/net/' [ 192.237217] kobject: 'queues' (00000000b92a25e8): kobject_add_internal: parent: '', set: '' [ 192.246333] kobject: 'queues' (00000000b92a25e8): kobject_uevent_env [ 192.252932] kobject: 'queues' (00000000b92a25e8): kobject_uevent_env: filter function caused the event to drop! [ 192.263195] kobject: 'rx-0' (0000000076331a07): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.272635] kobject: 'rx-0' (0000000076331a07): kobject_uevent_env [ 192.279040] kobject: 'rx-0' (0000000076331a07): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 192.289013] kobject: 'tx-0' (00000000d3ef1b71): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.298551] kobject: 'tx-0' (00000000d3ef1b71): kobject_uevent_env [ 192.304900] kobject: 'tx-0' (00000000d3ef1b71): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 192.315763] kobject: 'ppp0' (000000002f7e9b18): kobject_add_internal: parent: 'net', set: 'devices' [ 192.335888] kobject: 'ppp0' (000000002f7e9b18): kobject_uevent_env [ 192.343439] kobject: 'ppp0' (000000002f7e9b18): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 192.353566] kobject: 'queues' (000000001637da2e): kobject_add_internal: parent: 'ppp0', set: '' [ 192.364059] kobject: 'queues' (000000001637da2e): kobject_uevent_env [ 192.371188] kobject: 'queues' (000000001637da2e): kobject_uevent_env: filter function caused the event to drop! [ 192.382573] kobject: 'rx-0' (000000004c99a4bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.392712] kobject: 'rx-0' (000000004c99a4bc): kobject_uevent_env [ 192.399417] kobject: 'rx-0' (000000004c99a4bc): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 192.410011] kobject: 'tx-0' (000000009fd414d4): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.420111] kobject: 'tx-0' (000000009fd414d4): kobject_uevent_env [ 192.426491] kobject: 'tx-0' (000000009fd414d4): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 192.440367] kobject: 'rx-0' (0000000059279bc1): kobject_cleanup, parent 00000000e2251632 [ 192.451814] kobject: 'rx-0' (0000000059279bc1): auto cleanup 'remove' event [ 192.459078] kobject: 'rx-0' (0000000059279bc1): kobject_uevent_env [ 192.465416] kobject: 'rx-0' (0000000059279bc1): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 192.476699] kobject: 'rx-0' (0000000059279bc1): auto cleanup kobject_del [ 192.483617] kobject: 'rx-0' (0000000059279bc1): calling ktype release [ 192.490270] kobject: 'rx-0': free name [ 192.494180] kobject: 'tx-0' (000000000d1cf245): kobject_cleanup, parent 00000000e2251632 [ 192.502459] kobject: 'tx-0' (000000000d1cf245): auto cleanup 'remove' event [ 192.509608] kobject: 'tx-0' (000000000d1cf245): kobject_uevent_env [ 192.515931] kobject: 'tx-0' (000000000d1cf245): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 192.526151] kobject: 'tx-0' (000000000d1cf245): auto cleanup kobject_del [ 192.533052] kobject: 'tx-0' (000000000d1cf245): calling ktype release [ 192.539654] kobject: 'tx-0': free name [ 192.543547] kobject: 'queues' (00000000e2251632): kobject_cleanup, parent (null) [ 192.551972] kobject: 'queues' (00000000e2251632): calling ktype release [ 192.558743] kobject: 'queues' (00000000e2251632): kset_release [ 192.564710] kobject: 'queues': free name [ 192.569051] kobject: 'ppp0' (000000007e96b8d5): kobject_uevent_env [ 192.575382] kobject: 'ppp0' (000000007e96b8d5): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 192.585465] kobject: 'rx-0' (00000000ad746016): kobject_cleanup, parent 0000000094141e3e [ 192.593853] kobject: 'rx-0' (00000000ad746016): auto cleanup 'remove' event [ 192.601104] kobject: 'rx-0' (00000000ad746016): kobject_uevent_env [ 192.607578] kobject: 'rx-0' (00000000ad746016): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 192.618668] kobject: 'rx-0' (00000000ad746016): auto cleanup kobject_del [ 192.625528] kobject: 'rx-0' (00000000ad746016): calling ktype release [ 192.632396] kobject: 'rx-0': free name [ 192.636305] kobject: 'tx-0' (0000000056f71056): kobject_cleanup, parent 0000000094141e3e [ 192.644572] kobject: 'tx-0' (0000000056f71056): auto cleanup 'remove' event [ 192.651690] kobject: 'tx-0' (0000000056f71056): kobject_uevent_env [ 192.658049] kobject: 'tx-0' (0000000056f71056): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 192.668388] kobject: 'tx-0' (0000000056f71056): auto cleanup kobject_del [ 192.675428] kobject: 'tx-0' (0000000056f71056): calling ktype release [ 192.682031] kobject: 'tx-0': free name [ 192.685929] kobject: 'queues' (0000000094141e3e): kobject_cleanup, parent (null) [ 192.694357] kobject: 'queues' (0000000094141e3e): calling ktype release [ 192.701183] kobject: 'queues' (0000000094141e3e): kset_release [ 192.707199] kobject: 'queues': free name [ 192.711461] kobject: '' (000000004cd9587f): kobject_uevent_env [ 192.717570] kobject: '' (000000004cd9587f): fill_kobj_path: path = '/devices/virtual/net/' [ 192.727420] kobject: 'rx-0' (0000000076331a07): kobject_cleanup, parent 00000000b92a25e8 [ 192.735725] kobject: 'rx-0' (0000000076331a07): auto cleanup 'remove' event [ 192.742889] kobject: 'rx-0' (0000000076331a07): kobject_uevent_env [ 192.749382] kobject: 'rx-0' (0000000076331a07): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 192.759614] kobject: 'rx-0' (0000000076331a07): auto cleanup kobject_del [ 192.766481] kobject: 'rx-0' (0000000076331a07): calling ktype release [ 192.773272] kobject: 'rx-0': free name [ 192.777227] kobject: 'tx-0' (00000000d3ef1b71): kobject_cleanup, parent 00000000b92a25e8 [ 192.785459] kobject: 'tx-0' (00000000d3ef1b71): auto cleanup 'remove' event [ 192.792613] kobject: 'tx-0' (00000000d3ef1b71): kobject_uevent_env [ 192.799015] kobject: 'tx-0' (00000000d3ef1b71): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 192.808995] kobject: 'tx-0' (00000000d3ef1b71): auto cleanup kobject_del [ 192.815856] kobject: 'tx-0' (00000000d3ef1b71): calling ktype release [ 192.822466] kobject: 'tx-0': free name [ 192.826458] kobject: 'queues' (00000000b92a25e8): kobject_cleanup, parent (null) [ 192.834886] kobject: 'queues' (00000000b92a25e8): calling ktype release [ 192.841667] kobject: 'queues' (00000000b92a25e8): kset_release [ 192.847671] kobject: 'queues': free name [ 192.851928] kobject: '' (000000003315c38c): kobject_uevent_env [ 192.858043] kobject: '' (000000003315c38c): fill_kobj_path: path = '/devices/virtual/net/' [ 192.866947] kobject: 'ppp0' (00000000e1b95790): kobject_add_internal: parent: 'net', set: 'devices' [ 192.877634] kobject: 'ppp0' (00000000e1b95790): kobject_uevent_env [ 192.884087] kobject: 'ppp0' (00000000e1b95790): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 192.893455] kobject: 'queues' (00000000c245f2c6): kobject_add_internal: parent: 'ppp0', set: '' [ 192.902915] kobject: 'queues' (00000000c245f2c6): kobject_uevent_env [ 192.909447] kobject: 'queues' (00000000c245f2c6): kobject_uevent_env: filter function caused the event to drop! [ 192.919738] kobject: 'rx-0' (000000003cbae1d3): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.929186] kobject: 'rx-0' (000000003cbae1d3): kobject_uevent_env [ 192.935526] kobject: 'rx-0' (000000003cbae1d3): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 192.945797] kobject: 'tx-0' (000000006b902d05): kobject_add_internal: parent: 'queues', set: 'queues' [ 192.955355] kobject: 'tx-0' (000000006b902d05): kobject_uevent_env [ 192.961759] kobject: 'tx-0' (000000006b902d05): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 192.973279] kobject: 'rx-0' (000000003cbae1d3): kobject_cleanup, parent 00000000c245f2c6 [ 192.983057] kobject: 'rx-0' (000000003cbae1d3): auto cleanup 'remove' event [ 192.990397] kobject: 'rx-0' (000000003cbae1d3): kobject_uevent_env [ 192.996922] kobject: 'rx-0' (000000003cbae1d3): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 193.007315] kobject: 'rx-0' (000000003cbae1d3): auto cleanup kobject_del [ 193.014219] kobject: 'rx-0' (000000003cbae1d3): calling ktype release [ 193.020828] kobject: 'rx-0': free name [ 193.024829] kobject: 'tx-0' (000000006b902d05): kobject_cleanup, parent 00000000c245f2c6 [ 193.033081] kobject: 'tx-0' (000000006b902d05): auto cleanup 'remove' event [ 193.040205] kobject: 'tx-0' (000000006b902d05): kobject_uevent_env [ 193.046549] kobject: 'tx-0' (000000006b902d05): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 193.056814] kobject: 'tx-0' (000000006b902d05): auto cleanup kobject_del [ 193.063658] kobject: 'tx-0' (000000006b902d05): calling ktype release [ 193.070248] kobject: 'tx-0': free name [ 193.074155] kobject: 'queues' (00000000c245f2c6): kobject_cleanup, parent (null) [ 193.082608] kobject: 'queues' (00000000c245f2c6): calling ktype release [ 193.089387] kobject: 'queues' (00000000c245f2c6): kset_release [ 193.095343] kobject: 'queues': free name [ 193.099726] kobject: 'ppp0' (00000000e1b95790): kobject_uevent_env [ 193.106068] kobject: 'ppp0' (00000000e1b95790): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 193.116126] kobject: 'rx-0' (000000004c99a4bc): kobject_cleanup, parent 000000001637da2e [ 193.124412] kobject: 'rx-0' (000000004c99a4bc): auto cleanup 'remove' event [ 193.131616] kobject: 'rx-0' (000000004c99a4bc): kobject_uevent_env [ 193.138015] kobject: 'rx-0' (000000004c99a4bc): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 193.148351] kobject: 'rx-0' (000000004c99a4bc): auto cleanup kobject_del [ 193.155205] kobject: 'rx-0' (000000004c99a4bc): calling ktype release [ 193.161827] kobject: 'rx-0': free name [ 193.165753] kobject: 'tx-0' (000000009fd414d4): kobject_cleanup, parent 000000001637da2e [ 193.174032] kobject: 'tx-0' (000000009fd414d4): auto cleanup 'remove' event [ 193.181184] kobject: 'tx-0' (000000009fd414d4): kobject_uevent_env [ 193.187567] kobject: 'tx-0' (000000009fd414d4): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 193.197828] kobject: 'tx-0' (000000009fd414d4): auto cleanup kobject_del [ 193.204700] kobject: 'tx-0' (000000009fd414d4): calling ktype release [ 193.211328] kobject: 'tx-0': free name [ 193.215232] kobject: 'queues' (000000001637da2e): kobject_cleanup, parent (null) [ 193.223665] kobject: 'queues' (000000001637da2e): calling ktype release [ 193.230484] kobject: 'queues' (000000001637da2e): kset_release [ 193.236452] kobject: 'queues': free name [ 193.240830] kobject: 'ppp0' (000000002f7e9b18): kobject_uevent_env [ 193.247247] kobject: 'ppp0' (000000002f7e9b18): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 193.256524] kobject: 'ppp0' (000000007e96b8d5): kobject_cleanup, parent (null) [ 193.256746] kobject: '' (000000004cd9587f): kobject_cleanup, parent (null) [ 193.265092] kobject: '' (000000003315c38c): kobject_cleanup, parent (null) [ 193.272831] kobject: 'ppp0' (00000000e1b95790): kobject_cleanup, parent (null) [ 193.283222] kobject: 'ppp0' (000000007e96b8d5): calling ktype release [ 193.289368] kobject: '' (000000004cd9587f): calling ktype release [ 193.295726] kobject: 'ppp0': free name [ 193.302194] kobject: 'ppp0' (00000000e1b95790): calling ktype release [ 193.307938] kobject: '' (000000003315c38c): calling ktype release [ 193.312648] kobject: 'ppp0' (000000002f7e9b18): kobject_cleanup, parent (null) [ 193.321855] kobject: '': free name [ 193.331222] kobject: '': free name [ 193.335337] kobject: 'ppp0': free name 13:37:01 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0xfffffffffffffffc) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0x1) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 13:37:01 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 13:37:01 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(0xffffffffffffffff, r0) syz_open_dev$evdev(0x0, 0x1, 0x40) dup(0xffffffffffffffff) 13:37:01 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000100)='ns/pid\x00') setns(r0, 0x0) 13:37:01 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) [ 193.336645] kobject: 'ppp0' (000000002f7e9b18): calling ktype release [ 193.346778] kobject: 'ppp0': free name [ 193.351119] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env [ 193.366851] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' 13:37:01 executing program 0: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) 13:37:01 executing program 3: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) [ 193.383458] kobject: 'ppp0' (00000000a9271af8): kobject_add_internal: parent: 'net', set: 'devices' [ 193.402852] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 193.451970] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 193.462621] kobject: 'ppp0' (00000000a9271af8): kobject_uevent_env [ 193.473196] kobject: 'ppp0' (00000000a9271af8): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 193.483534] kobject: 'queues' (000000003065156c): kobject_add_internal: parent: 'ppp0', set: '' [ 193.488850] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env 13:37:01 executing program 1: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) 13:37:02 executing program 2: syz_open_procfs(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x10, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) [ 193.493582] kobject: 'queues' (000000003065156c): kobject_uevent_env [ 193.506396] kobject: 'queues' (000000003065156c): kobject_uevent_env: filter function caused the event to drop! [ 193.520857] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 193.529590] kobject: 'rx-0' (00000000e09064c2): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.545956] kobject: 'rx-0' (00000000e09064c2): kobject_uevent_env [ 193.547305] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 193.553439] kobject: 'rx-0' (00000000e09064c2): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 193.578694] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 193.580019] kobject: 'tx-0' (00000000435ccce5): kobject_add_internal: parent: 'queues', set: 'queues' 13:37:02 executing program 1: wait4(0x0, 0x0, 0x80000000, 0x0) [ 193.592632] kobject: 'loop0' (00000000d515af63): kobject_uevent_env [ 193.612856] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 193.630851] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 193.633568] kobject: 'tx-0' (00000000435ccce5): kobject_uevent_env 13:37:02 executing program 1: wait4(0x0, 0x0, 0x80000000, 0x0) [ 193.650183] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 193.652075] kobject: 'tx-0' (00000000435ccce5): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 193.681358] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 193.683910] kobject: 'ppp0' (00000000c06fabcb): kobject_add_internal: parent: 'net', set: 'devices' [ 193.704327] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 193.722687] kobject: 'ppp0' (00000000c06fabcb): kobject_uevent_env [ 193.729444] kobject: 'ppp0' (00000000c06fabcb): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 193.733980] kobject: 'loop2' (000000003f2e4b19): kobject_uevent_env [ 193.739537] kobject: 'queues' (0000000058d0d398): kobject_add_internal: parent: 'ppp0', set: '' 13:37:02 executing program 1: wait4(0x0, 0x0, 0x80000000, 0x0) [ 193.755045] kobject: 'queues' (0000000058d0d398): kobject_uevent_env [ 193.755176] kobject: 'loop2' (000000003f2e4b19): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 193.762122] kobject: 'queues' (0000000058d0d398): kobject_uevent_env: filter function caused the event to drop! [ 193.782306] kobject: 'rx-0' (00000000df86ec01): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.797022] kobject: 'rx-0' (00000000df86ec01): kobject_uevent_env [ 193.800211] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 193.816008] kobject: 'rx-0' (00000000df86ec01): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 193.823907] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 193.837521] kobject: 'tx-0' (00000000b7369fa6): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.853760] kobject: 'tx-0' (00000000b7369fa6): kobject_uevent_env [ 193.867289] kobject: 'tx-0' (00000000b7369fa6): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 193.911830] kobject: '' (0000000089d82648): kobject_add_internal: parent: 'net', set: 'devices' [ 193.922084] kobject: '' (0000000089d82648): kobject_uevent_env [ 193.930127] kobject: '' (0000000089d82648): fill_kobj_path: path = '/devices/virtual/net/' [ 193.939772] kobject: 'queues' (0000000037d08566): kobject_add_internal: parent: '', set: '' [ 193.950565] kobject: 'queues' (0000000037d08566): kobject_uevent_env [ 193.957250] kobject: 'queues' (0000000037d08566): kobject_uevent_env: filter function caused the event to drop! [ 193.968190] kobject: 'rx-0' (00000000e73511da): kobject_add_internal: parent: 'queues', set: 'queues' [ 193.977778] kobject: 'rx-0' (00000000e73511da): kobject_uevent_env [ 193.984258] kobject: 'rx-0' (00000000e73511da): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 193.994376] kobject: 'tx-0' (000000004607cbf6): kobject_add_internal: parent: 'queues', set: 'queues' [ 194.004251] kobject: 'tx-0' (000000004607cbf6): kobject_uevent_env [ 194.010990] kobject: 'tx-0' (000000004607cbf6): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 194.022120] kobject: '' (00000000b3763288): kobject_add_internal: parent: 'net', set: 'devices' [ 194.032406] kobject: '' (00000000b3763288): kobject_uevent_env [ 194.040830] kobject: '' (00000000b3763288): fill_kobj_path: path = '/devices/virtual/net/' [ 194.050175] kobject: 'queues' (00000000728e9be3): kobject_add_internal: parent: '', set: '' [ 194.061249] kobject: 'queues' (00000000728e9be3): kobject_uevent_env [ 194.068317] kobject: 'queues' (00000000728e9be3): kobject_uevent_env: filter function caused the event to drop! [ 194.080488] kobject: 'rx-0' (000000000bcebba4): kobject_add_internal: parent: 'queues', set: 'queues' [ 194.090399] kobject: 'rx-0' (000000000bcebba4): kobject_uevent_env [ 194.098695] kobject: 'rx-0' (000000000bcebba4): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 194.109283] kobject: 'tx-0' (000000005b419c44): kobject_add_internal: parent: 'queues', set: 'queues' [ 194.122847] kobject: 'tx-0' (000000005b419c44): kobject_uevent_env [ 194.129655] kobject: 'tx-0' (000000005b419c44): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 194.143095] kobject: 'rx-0' (00000000e09064c2): kobject_cleanup, parent 000000003065156c [ 194.155830] kobject: 'rx-0' (00000000e09064c2): auto cleanup 'remove' event [ 194.166648] kobject: 'rx-0' (00000000e09064c2): kobject_uevent_env [ 194.176943] kobject: 'rx-0' (00000000e09064c2): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 194.187551] kobject: 'rx-0' (00000000e09064c2): auto cleanup kobject_del [ 194.194469] kobject: 'rx-0' (00000000e09064c2): calling ktype release [ 194.201527] kobject: 'rx-0': free name [ 194.205542] kobject: 'tx-0' (00000000435ccce5): kobject_cleanup, parent 000000003065156c 13:37:02 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0xfffffffffffffffc) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0x1) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) 13:37:02 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) [ 194.213862] kobject: 'tx-0' (00000000435ccce5): auto cleanup 'remove' event [ 194.221218] kobject: 'tx-0' (00000000435ccce5): kobject_uevent_env [ 194.228233] kobject: 'tx-0' (00000000435ccce5): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 194.243312] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 194.249940] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 194.258967] kobject: 'tx-0' (00000000435ccce5): auto cleanup kobject_del [ 194.266869] kobject: 'tx-0' (00000000435ccce5): calling ktype release [ 194.273624] kobject: 'tx-0': free name [ 194.277833] kobject: 'queues' (000000003065156c): kobject_cleanup, parent (null) [ 194.286401] kobject: 'queues' (000000003065156c): calling ktype release [ 194.293541] kobject: 'queues' (000000003065156c): kset_release [ 194.299812] kobject: 'queues': free name [ 194.304371] kobject: 'ppp0' (00000000a9271af8): kobject_uevent_env [ 194.311049] kobject: 'ppp0' (00000000a9271af8): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 194.321643] kobject: 'rx-0' (00000000df86ec01): kobject_cleanup, parent 0000000058d0d398 [ 194.330125] kobject: 'rx-0' (00000000df86ec01): auto cleanup 'remove' event [ 194.337712] kobject: 'rx-0' (00000000df86ec01): kobject_uevent_env [ 194.344264] kobject: 'rx-0' (00000000df86ec01): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 194.355073] kobject: 'rx-0' (00000000df86ec01): auto cleanup kobject_del [ 194.362372] kobject: 'rx-0' (00000000df86ec01): calling ktype release [ 194.369507] kobject: 'rx-0': free name [ 194.373630] kobject: 'tx-0' (00000000b7369fa6): kobject_cleanup, parent 0000000058d0d398 [ 194.382289] kobject: 'tx-0' (00000000b7369fa6): auto cleanup 'remove' event [ 194.389772] kobject: 'tx-0' (00000000b7369fa6): kobject_uevent_env [ 194.396308] kobject: 'tx-0' (00000000b7369fa6): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 194.406969] kobject: 'tx-0' (00000000b7369fa6): auto cleanup kobject_del [ 194.414074] kobject: 'tx-0' (00000000b7369fa6): calling ktype release [ 194.421182] kobject: 'tx-0': free name [ 194.425267] kobject: 'queues' (0000000058d0d398): kobject_cleanup, parent (null) [ 194.434109] kobject: 'queues' (0000000058d0d398): calling ktype release [ 194.441275] kobject: 'queues' (0000000058d0d398): kset_release [ 194.447639] kobject: 'queues': free name [ 194.452185] kobject: 'ppp0' (00000000c06fabcb): kobject_uevent_env [ 194.458919] kobject: 'ppp0' (00000000c06fabcb): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 194.469770] kobject: 'rx-0' (00000000e73511da): kobject_cleanup, parent 0000000037d08566 [ 194.478556] kobject: 'rx-0' (00000000e73511da): auto cleanup 'remove' event [ 194.485837] kobject: 'rx-0' (00000000e73511da): kobject_uevent_env [ 194.492606] kobject: 'rx-0' (00000000e73511da): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 194.503129] kobject: 'rx-0' (00000000e73511da): auto cleanup kobject_del [ 194.510521] kobject: 'rx-0' (00000000e73511da): calling ktype release [ 194.517541] kobject: 'rx-0': free name [ 194.521656] kobject: 'tx-0' (000000004607cbf6): kobject_cleanup, parent 0000000037d08566 [ 194.530278] kobject: 'tx-0' (000000004607cbf6): auto cleanup 'remove' event [ 194.537754] kobject: 'tx-0' (000000004607cbf6): kobject_uevent_env [ 194.544288] kobject: 'tx-0' (000000004607cbf6): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 194.554647] kobject: 'tx-0' (000000004607cbf6): auto cleanup kobject_del [ 194.561912] kobject: 'tx-0' (000000004607cbf6): calling ktype release [ 194.568861] kobject: 'tx-0': free name [ 194.572942] kobject: 'queues' (0000000037d08566): kobject_cleanup, parent (null) [ 194.581750] kobject: 'queues' (0000000037d08566): calling ktype release [ 194.589822] kobject: 'queues' (0000000037d08566): kset_release [ 194.595992] kobject: 'queues': free name [ 194.600840] kobject: '' (0000000089d82648): kobject_uevent_env [ 194.607275] kobject: '' (0000000089d82648): fill_kobj_path: path = '/devices/virtual/net/' [ 194.617581] kobject: 'rx-0' (000000000bcebba4): kobject_cleanup, parent 00000000728e9be3 [ 194.626017] kobject: 'rx-0' (000000000bcebba4): auto cleanup 'remove' event [ 194.633620] kobject: 'rx-0' (000000000bcebba4): kobject_uevent_env [ 194.640371] kobject: 'rx-0' (000000000bcebba4): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 194.650921] kobject: 'rx-0' (000000000bcebba4): auto cleanup kobject_del [ 194.658217] kobject: 'rx-0' (000000000bcebba4): calling ktype release [ 194.664996] kobject: 'rx-0': free name [ 194.669365] kobject: 'tx-0' (000000005b419c44): kobject_cleanup, parent 00000000728e9be3 [ 194.678008] kobject: 'tx-0' (000000005b419c44): auto cleanup 'remove' event [ 194.685292] kobject: 'tx-0' (000000005b419c44): kobject_uevent_env [ 194.692112] kobject: 'tx-0' (000000005b419c44): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 194.702562] kobject: 'tx-0' (000000005b419c44): auto cleanup kobject_del [ 194.709889] kobject: 'tx-0' (000000005b419c44): calling ktype release [ 194.716888] kobject: 'tx-0': free name [ 194.720982] kobject: 'queues' (00000000728e9be3): kobject_cleanup, parent (null) [ 194.729794] kobject: 'queues' (00000000728e9be3): calling ktype release [ 194.736927] kobject: 'queues' (00000000728e9be3): kset_release [ 194.743088] kobject: 'queues': free name [ 194.748181] kobject: '' (00000000b3763288): kobject_uevent_env [ 194.754476] kobject: '' (00000000b3763288): fill_kobj_path: path = '/devices/virtual/net/' [ 194.763733] kobject: 'ppp0' (00000000a9271af8): kobject_cleanup, parent (null) [ 194.772354] kobject: 'ppp0' (00000000c06fabcb): kobject_cleanup, parent (null) [ 194.778215] kobject: 'ppp0' (00000000a9271af8): calling ktype release [ 194.780704] kobject: '' (0000000089d82648): kobject_cleanup, parent (null) [ 194.795487] kobject: '' (0000000089d82648): calling ktype release [ 194.795583] kobject: 'ppp0': free name [ 194.802069] kobject: 'ppp0' (00000000c06fabcb): calling ktype release [ 194.812630] kobject: '' (00000000b3763288): kobject_cleanup, parent (null) 13:37:03 executing program 4: syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = memfd_create(&(0x7f0000000280)='^\x00', 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, 0x0, 0x102002700) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) dup2(0xffffffffffffffff, r0) syz_open_dev$evdev(0x0, 0x1, 0x40) dup(0xffffffffffffffff) [ 194.824300] kobject: '': free name [ 194.828203] kobject: '' (00000000b3763288): calling ktype release [ 194.838923] kobject: 'ppp0': free name [ 194.839540] kobject: '': free name [ 194.845921] kobject: 'ppp0' (00000000c0968fce): kobject_add_internal: parent: 'net', set: 'devices' [ 194.862931] kobject: 'loop4' (00000000fb39b4f6): kobject_uevent_env 13:37:03 executing program 0: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) [ 194.884157] kobject: 'loop4' (00000000fb39b4f6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 194.900715] kobject: 'ppp0' (00000000c0968fce): kobject_uevent_env [ 194.916540] kobject: 'ppp0' (00000000c0968fce): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 194.926306] kobject: 'loop0' (00000000d515af63): kobject_uevent_env 13:37:03 executing program 3: io_setup(0x6, &(0x7f00000001c0)=0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000040)="11") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000240)={'\b\x00\x00\x00e&\xa28\x00\x00\x00\x00\x02\x00\xef\f', 0x20000005003}) io_submit(r0, 0x371, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f0000000040), 0xff66}]) [ 194.940438] kobject: 'loop0' (00000000d515af63): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 194.955843] kobject: 'queues' (00000000d249ad28): kobject_add_internal: parent: 'ppp0', set: '' [ 194.979926] kobject: 'loop3' (00000000845db23b): kobject_uevent_env [ 194.987225] kobject: 'queues' (00000000d249ad28): kobject_uevent_env [ 194.994715] kobject: 'loop3' (00000000845db23b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 195.007102] kobject: 'queues' (00000000d249ad28): kobject_uevent_env: filter function caused the event to drop! [ 195.027046] kobject: 'rx-0' (000000003883fcfa): kobject_add_internal: parent: 'queues', set: 'queues' 13:37:03 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) [ 195.048542] kobject: 'loop1' (0000000006c5fdd2): kobject_uevent_env [ 195.057278] kobject: 'loop1' (0000000006c5fdd2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 195.075824] kobject: 'rx-0' (000000003883fcfa): kobject_uevent_env 13:37:03 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0xfffffffffffffffc) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0x1) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f00000001c0), 0xa198) [ 195.098912] kobject: 'rx-0' (000000003883fcfa): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 195.114625] kobject: 'tx-0' (000000001d64fec7): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.124437] kobject: 'loop5' (00000000011cce4c): kobject_uevent_env [ 195.134590] kobject: 'loop5' (00000000011cce4c): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 195.136785] kobject: 'tx-0' (000000001d64fec7): kobject_uevent_env [ 195.151142] kobject: 'tx-0' (000000001d64fec7): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 195.164232] kobject: 'rx-0' (000000003883fcfa): kobject_cleanup, parent 00000000d249ad28 [ 195.172974] kobject: 'rx-0' (000000003883fcfa): auto cleanup 'remove' event [ 195.180495] kobject: 'rx-0' (000000003883fcfa): kobject_uevent_env [ 195.187230] kobject: 'rx-0' (000000003883fcfa): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 195.197894] kobject: 'rx-0' (000000003883fcfa): auto cleanup kobject_del [ 195.204893] kobject: 'rx-0' (000000003883fcfa): calling ktype release [ 195.211892] kobject: 'rx-0': free name [ 195.215961] kobject: 'tx-0' (000000001d64fec7): kobject_cleanup, parent 00000000d249ad28 [ 195.224581] kobject: 'tx-0' (000000001d64fec7): auto cleanup 'remove' event [ 195.232621] kobject: 'tx-0' (000000001d64fec7): kobject_uevent_env [ 195.239322] kobject: 'tx-0' (000000001d64fec7): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 195.249881] kobject: 'tx-0' (000000001d64fec7): auto cleanup kobject_del [ 195.257151] kobject: 'tx-0' (000000001d64fec7): calling ktype release [ 195.263868] kobject: 'tx-0': free name [ 195.268135] kobject: 'queues' (00000000d249ad28): kobject_cleanup, parent (null) [ 195.276873] kobject: 'queues' (00000000d249ad28): calling ktype release [ 195.283783] kobject: 'queues' (00000000d249ad28): kset_release [ 195.290147] kobject: 'queues': free name [ 195.294688] kobject: 'ppp0' (00000000c0968fce): kobject_uevent_env [ 195.301402] kobject: 'ppp0' (00000000c0968fce): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 195.311245] kobject: '' (00000000b9be7493): kobject_add_internal: parent: 'net', set: 'devices' [ 195.323607] kobject: '' (00000000b9be7493): kobject_uevent_env [ 195.329830] kobject: '' (00000000b9be7493): fill_kobj_path: path = '/devices/virtual/net/' [ 195.340898] kobject: 'queues' (000000005e6b8716): kobject_add_internal: parent: '', set: '' [ 195.350155] kobject: 'queues' (000000005e6b8716): kobject_uevent_env [ 195.358948] kobject: 'queues' (000000005e6b8716): kobject_uevent_env: filter function caused the event to drop! [ 195.369327] kobject: 'rx-0' (0000000076cc272f): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.381017] kobject: 'rx-0' (0000000076cc272f): kobject_uevent_env [ 195.387620] kobject: 'rx-0' (0000000076cc272f): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 195.399872] kobject: 'tx-0' (000000002091953b): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.409803] kobject: 'tx-0' (000000002091953b): kobject_uevent_env [ 195.416276] kobject: 'tx-0' (000000002091953b): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 195.429317] kobject: '' (00000000e9ea3063): kobject_add_internal: parent: 'net', set: 'devices' [ 195.439218] kobject: '' (00000000e9ea3063): kobject_uevent_env [ 195.458789] kobject: '' (00000000e9ea3063): fill_kobj_path: path = '/devices/virtual/net/' [ 195.468387] kobject: 'queues' (0000000018a65d5b): kobject_add_internal: parent: '', set: '' [ 195.480062] kobject: 'queues' (0000000018a65d5b): kobject_uevent_env [ 195.486880] kobject: 'queues' (0000000018a65d5b): kobject_uevent_env: filter function caused the event to drop! [ 195.499595] kobject: 'rx-0' (000000000df068b1): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.509310] kobject: 'rx-0' (000000000df068b1): kobject_uevent_env [ 195.515752] kobject: 'rx-0' (000000000df068b1): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 195.528198] kobject: 'tx-0' (000000006b343e1e): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.539081] kobject: 'tx-0' (000000006b343e1e): kobject_uevent_env [ 195.545553] kobject: 'tx-0' (000000006b343e1e): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 195.561360] kobject: 'ppp0' (0000000010f34f97): kobject_add_internal: parent: 'net', set: 'devices' [ 195.590065] kobject: 'ppp0' (0000000010f34f97): kobject_uevent_env [ 195.603564] kobject: 'ppp0' (0000000010f34f97): fill_kobj_path: path = '/devices/virtual/net/ppp0' [ 195.613984] kobject: 'queues' (00000000d9bca535): kobject_add_internal: parent: 'ppp0', set: '' [ 195.626077] kobject: 'queues' (00000000d9bca535): kobject_uevent_env [ 195.633035] kobject: 'queues' (00000000d9bca535): kobject_uevent_env: filter function caused the event to drop! [ 195.645953] kobject: 'rx-0' (000000007dc8a0fc): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.656279] kobject: 'rx-0' (000000007dc8a0fc): kobject_uevent_env [ 195.665366] kobject: 'rx-0' (000000007dc8a0fc): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 195.676917] kobject: 'tx-0' (0000000019833ff0): kobject_add_internal: parent: 'queues', set: 'queues' [ 195.690765] kobject: 'tx-0' (0000000019833ff0): kobject_uevent_env [ 195.698666] kobject: 'tx-0' (0000000019833ff0): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/tx-0' [ 195.717474] kobject: 'rx-0' (000000007dc8a0fc): kobject_cleanup, parent 00000000d9bca535 [ 195.725878] kobject: 'rx-0' (000000007dc8a0fc): auto cleanup 'remove' event [ 195.733165] kobject: 'rx-0' (000000007dc8a0fc): kobject_uevent_env [ 195.739685] kobject: 'rx-0' (000000007dc8a0fc): fill_kobj_path: path = '/devices/virtual/net/ppp0/queues/rx-0' [ 195.750074] kobject: 'rx-0' (000000007dc8a0fc): auto cleanup kobject_del [ 195.757124] kobject: 'rx-0' (000000007dc8a0fc): calling ktype release [ 195.763859] kobject: 'rx-0': free name