Warning: Permanently added '10.128.1.49' (ECDSA) to the list of known hosts. 2019/08/28 15:11:38 fuzzer started syzkaller login: [ 49.678829] kauditd_printk_skb: 2 callbacks suppressed [ 49.678844] audit: type=1400 audit(1567005098.861:36): avc: denied { map } for pid=7653 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/08/28 15:11:41 dialing manager at 10.128.0.105:38479 2019/08/28 15:11:41 syscalls: 2482 2019/08/28 15:11:41 code coverage: enabled 2019/08/28 15:11:41 comparison tracing: enabled 2019/08/28 15:11:41 extra coverage: extra coverage is not supported by the kernel 2019/08/28 15:11:41 setuid sandbox: enabled 2019/08/28 15:11:41 namespace sandbox: enabled 2019/08/28 15:11:41 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/28 15:11:41 fault injection: enabled 2019/08/28 15:11:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/28 15:11:41 net packet injection: enabled 2019/08/28 15:11:41 net device setup: enabled 15:13:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f00000006c0)={0x14, 0x19, 0x400000000000109, 0x0, 0x0, {0x400000000001c}}, 0x14}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 156.544978] audit: type=1400 audit(1567005205.731:37): avc: denied { map } for pid=7671 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=15032 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 156.670299] IPVS: ftp: loaded support on port[0] = 21 15:13:25 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "0fe31d6f7840315d", "4c6ecc0da9bc06c2eeb0738371ffc6eb1373b69128754baba506b74c805ab546", "1fdcf5c3", "17e6573038191760"}, 0x38) [ 156.851484] chnl_net:caif_netlink_parms(): no params data found [ 156.869806] IPVS: ftp: loaded support on port[0] = 21 15:13:26 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) [ 156.937395] bridge0: port 1(bridge_slave_0) entered blocking state [ 156.944788] bridge0: port 1(bridge_slave_0) entered disabled state [ 156.953160] device bridge_slave_0 entered promiscuous mode [ 156.970196] bridge0: port 2(bridge_slave_1) entered blocking state [ 156.981638] bridge0: port 2(bridge_slave_1) entered disabled state [ 156.990934] device bridge_slave_1 entered promiscuous mode [ 157.045291] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.077705] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 157.126699] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 157.136272] team0: Port device team_slave_0 added [ 157.142193] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 157.146205] IPVS: ftp: loaded support on port[0] = 21 [ 157.149879] team0: Port device team_slave_1 added [ 157.160669] chnl_net:caif_netlink_parms(): no params data found [ 157.176087] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 157.206672] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 15:13:26 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 157.316955] device hsr_slave_0 entered promiscuous mode [ 157.354016] device hsr_slave_1 entered promiscuous mode [ 157.394249] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 157.401505] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 157.430279] IPVS: ftp: loaded support on port[0] = 21 [ 157.442880] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.450624] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.459150] device bridge_slave_0 entered promiscuous mode 15:13:26 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 157.518163] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.525674] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.541031] device bridge_slave_1 entered promiscuous mode [ 157.570055] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.576672] bridge0: port 2(bridge_slave_1) entered forwarding state [ 157.583857] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.590229] bridge0: port 1(bridge_slave_0) entered forwarding state [ 157.635936] chnl_net:caif_netlink_parms(): no params data found [ 157.671216] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 157.718585] IPVS: ftp: loaded support on port[0] = 21 [ 157.727278] bond0: Enslaving bond_slave_1 as an active interface with an up link 15:13:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") getrlimit(0x0, &(0x7f00000000c0)) [ 157.813646] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 157.821361] team0: Port device team_slave_0 added [ 157.839346] bridge0: port 1(bridge_slave_0) entered blocking state [ 157.849368] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.856813] device bridge_slave_0 entered promiscuous mode [ 157.877676] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 157.887923] team0: Port device team_slave_1 added [ 157.898657] bridge0: port 1(bridge_slave_0) entered disabled state [ 157.906680] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.919845] bridge0: port 2(bridge_slave_1) entered blocking state [ 157.928807] bridge0: port 2(bridge_slave_1) entered disabled state [ 157.937634] device bridge_slave_1 entered promiscuous mode [ 157.962660] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 157.981784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 158.035780] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.046698] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.095570] device hsr_slave_0 entered promiscuous mode [ 158.133980] device hsr_slave_1 entered promiscuous mode [ 158.175527] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 158.198101] chnl_net:caif_netlink_parms(): no params data found [ 158.206310] IPVS: ftp: loaded support on port[0] = 21 [ 158.232392] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 158.244416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.251760] team0: Port device team_slave_0 added [ 158.294593] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.301957] team0: Port device team_slave_1 added [ 158.308545] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 158.318356] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 158.338018] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.395623] device hsr_slave_0 entered promiscuous mode [ 158.473987] device hsr_slave_1 entered promiscuous mode [ 158.516802] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 158.527924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 158.539152] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 158.547220] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.553948] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.561030] device bridge_slave_0 entered promiscuous mode [ 158.569537] chnl_net:caif_netlink_parms(): no params data found [ 158.577874] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 158.591927] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 158.598419] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.605142] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.612301] device bridge_slave_1 entered promiscuous mode [ 158.633930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.641723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.652921] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 158.659359] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.681127] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 158.692361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 158.703924] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.711968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.719910] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.726530] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.743299] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 158.753458] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 158.811639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.820180] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.828033] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.835513] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.846440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 158.858559] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.865053] bridge0: port 1(bridge_slave_0) entered disabled state [ 158.872194] device bridge_slave_0 entered promiscuous mode [ 158.886266] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 158.894331] team0: Port device team_slave_0 added [ 158.902828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.914972] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 158.923783] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 158.935296] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 158.943150] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.949858] bridge0: port 2(bridge_slave_1) entered disabled state [ 158.959823] device bridge_slave_1 entered promiscuous mode [ 158.971177] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 158.978814] team0: Port device team_slave_1 added [ 158.986191] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 158.994162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.014017] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 159.021947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 159.030141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 159.039550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 159.052606] chnl_net:caif_netlink_parms(): no params data found [ 159.105648] device hsr_slave_0 entered promiscuous mode [ 159.143987] device hsr_slave_1 entered promiscuous mode [ 159.185234] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 159.195979] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 159.204078] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 159.211919] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.222173] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 159.231626] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.245777] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.258251] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 159.268774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.276578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.289414] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 159.317275] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.324989] team0: Port device team_slave_0 added [ 159.330972] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.339260] team0: Port device team_slave_1 added [ 159.345381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.352899] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.363443] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 159.370303] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.392288] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 159.400384] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 159.408265] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.465620] device hsr_slave_0 entered promiscuous mode [ 159.503995] device hsr_slave_1 entered promiscuous mode [ 159.557507] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.579611] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.586205] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.593404] device bridge_slave_0 entered promiscuous mode [ 159.600911] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 159.616793] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 159.626691] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 159.633014] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.639749] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.647803] device bridge_slave_1 entered promiscuous mode [ 159.669151] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 159.680635] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 159.693453] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 159.703385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 159.712786] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 159.732327] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.739788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.750103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.770884] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 159.779786] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 159.787670] team0: Port device team_slave_0 added [ 159.797098] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 159.803204] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.816233] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 159.823277] audit: type=1400 audit(1567005209.001:38): avc: denied { associate } for pid=7672 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 159.848777] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 159.862561] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 159.871308] team0: Port device team_slave_1 added [ 159.878284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 159.886868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 159.895277] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 159.902975] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.909440] bridge0: port 1(bridge_slave_0) entered forwarding state [ 159.916314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 159.923305] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 159.931558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 159.940487] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 159.950714] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 159.957730] 8021q: adding VLAN 0 to HW filter on device team0 [ 159.965413] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 159.974564] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 159.986384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 159.998104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.014720] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.021086] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.036480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 160.045629] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.053118] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.069820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.078145] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.086164] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.092526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 160.119717] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 160.128753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 160.136787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 160.146493] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 160.154835] bridge0: port 2(bridge_slave_1) entered blocking state [ 160.161191] bridge0: port 2(bridge_slave_1) entered forwarding state [ 160.217370] device hsr_slave_0 entered promiscuous mode [ 160.254191] device hsr_slave_1 entered promiscuous mode [ 160.294621] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 160.302201] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 160.311540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 160.321446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready 15:13:29 executing program 0: r0 = socket$inet(0x2, 0x4000020000000007, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000140)) fcntl$addseals(r0, 0x409, 0xf) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000280)={0xffff, 0x0, 0x2, 'queue0\x00', 0x3}) [ 160.339589] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 160.356458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 160.371316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.381026] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 160.397031] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.405623] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 160.430166] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.440952] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.452978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.473268] 8021q: adding VLAN 0 to HW filter on device bond0 [ 160.482473] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.491046] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready 15:13:29 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 160.500249] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 160.519051] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.526329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 160.544521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 160.559258] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.570425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.583897] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.591383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.604194] [ 160.604470] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 160.605861] ======================================================== [ 160.605870] WARNING: possible irq lock inversion dependency detected [ 160.614456] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 160.618438] 4.19.68 #42 Not tainted [ 160.618441] -------------------------------------------------------- [ 160.618449] syz-executor.5/7688 just changed the state of lock: [ 160.618455] 00000000a47b167d ( [ 160.628340] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 160.631046] &(&ctx->ctx_lock)->rlock){..-.}, at: free_ioctx_users+0x2d/0x490 [ 160.631082] but this lock took another, SOFTIRQ-unsafe lock in the past: [ 160.634798] 8021q: adding VLAN 0 to HW filter on device team0 [ 160.641193] (&fiq->waitq){+.+.} [ 160.641203] [ 160.641203] [ 160.641203] and interrupts could create inverse lock ordering between them. [ 160.641203] [ 160.641206] [ 160.641206] other info that might help us debug this: [ 160.641209] Possible interrupt unsafe locking scenario: [ 160.641209] [ 160.641211] CPU0 CPU1 [ 160.641219] ---- ---- [ 160.650569] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 160.656559] lock(&fiq->waitq); [ 160.656568] local_irq_disable(); [ 160.656570] lock(&(&ctx->ctx_lock)->rlock); [ 160.656577] lock(&fiq->waitq); [ 160.656583] [ 160.656584] lock(&(&ctx->ctx_lock)->rlock); [ 160.656590] [ 160.656590] *** DEADLOCK *** [ 160.656590] [ 160.656599] 2 locks held by syz-executor.5/7688: [ 160.656601] #0: 00000000008ad114 (rcu_callback){....}, at: rcu_process_callbacks+0xc79/0x1a30 [ 160.656636] #1: 00000000b0e1bde2 (rcu_read_lock_sched){....}, at: percpu_ref_switch_to_atomic_rcu+0x1ca/0x540 [ 160.656664] [ 160.656664] the shortest dependencies between 2nd lock and 1st lock: [ 160.656677] -> (&fiq->waitq){+.+.} ops: 8 { [ 160.656692] HARDIRQ-ON-W at: [ 160.656704] lock_acquire+0x16f/0x3f0 [ 160.656715] _raw_spin_lock+0x2f/0x40 [ 160.656726] flush_bg_queue+0x1f3/0x3d0 [ 160.656738] fuse_request_send_background_locked+0x26d/0x4e0 [ 160.656746] fuse_request_send_background+0x12b/0x180 [ 160.656755] cuse_channel_open+0x5ba/0x830 [ 160.656767] misc_open+0x395/0x4c0 [ 160.656776] chrdev_open+0x245/0x6b0 [ 160.656788] do_dentry_open+0x4c3/0x1210 [ 160.656797] vfs_open+0xa0/0xd0 [ 160.656810] path_openat+0x10d7/0x45e0 [ 160.656822] do_filp_open+0x1a1/0x280 [ 160.656831] do_sys_open+0x3fe/0x550 [ 160.656841] __x64_sys_openat+0x9d/0x100 [ 160.656854] do_syscall_64+0xfd/0x620 [ 160.656866] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.656870] SOFTIRQ-ON-W at: [ 160.656882] lock_acquire+0x16f/0x3f0 [ 160.656892] _raw_spin_lock+0x2f/0x40 [ 160.656899] flush_bg_queue+0x1f3/0x3d0 [ 160.656910] fuse_request_send_background_locked+0x26d/0x4e0 [ 160.656919] fuse_request_send_background+0x12b/0x180 [ 160.656929] cuse_channel_open+0x5ba/0x830 [ 160.656939] misc_open+0x395/0x4c0 [ 160.656947] chrdev_open+0x245/0x6b0 [ 160.656959] do_dentry_open+0x4c3/0x1210 [ 160.656967] vfs_open+0xa0/0xd0 [ 160.656977] path_openat+0x10d7/0x45e0 [ 160.656988] do_filp_open+0x1a1/0x280 [ 160.656998] do_sys_open+0x3fe/0x550 [ 160.657007] __x64_sys_openat+0x9d/0x100 [ 160.657018] do_syscall_64+0xfd/0x620 [ 160.657028] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.657037] INITIAL USE at: [ 160.657048] lock_acquire+0x16f/0x3f0 [ 160.657058] _raw_spin_lock+0x2f/0x40 [ 160.657066] flush_bg_queue+0x1f3/0x3d0 [ 160.657078] fuse_request_send_background_locked+0x26d/0x4e0 [ 160.657088] fuse_request_send_background+0x12b/0x180 [ 160.657097] cuse_channel_open+0x5ba/0x830 [ 160.657107] misc_open+0x395/0x4c0 [ 160.657116] chrdev_open+0x245/0x6b0 [ 160.657128] do_dentry_open+0x4c3/0x1210 [ 160.657136] vfs_open+0xa0/0xd0 [ 160.657146] path_openat+0x10d7/0x45e0 [ 160.657157] do_filp_open+0x1a1/0x280 [ 160.657165] do_sys_open+0x3fe/0x550 [ 160.657175] __x64_sys_openat+0x9d/0x100 [ 160.657186] do_syscall_64+0xfd/0x620 [ 160.657197] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.657200] } [ 160.657216] ... key at: [] __key.42211+0x0/0x40 [ 160.657219] ... acquired at: [ 160.657227] _raw_spin_lock+0x2f/0x40 [ 160.657240] io_submit_one+0xef2/0x2eb0 [ 160.657251] __x64_sys_io_submit+0x1aa/0x520 [ 160.657261] do_syscall_64+0xfd/0x620 [ 160.657272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.657274] [ 160.657276] -> (&(&ctx->ctx_lock)->rlock){..-.} ops: 3 { [ 160.657291] IN-SOFTIRQ-W at: [ 160.657303] lock_acquire+0x16f/0x3f0 [ 160.657314] _raw_spin_lock_irq+0x60/0x80 [ 160.657324] free_ioctx_users+0x2d/0x490 [ 160.657336] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 160.657346] rcu_process_callbacks+0xba0/0x1a30 [ 160.657359] __do_softirq+0x25c/0x921 [ 160.657372] irq_exit+0x180/0x1d0 [ 160.657383] smp_apic_timer_interrupt+0x13b/0x550 [ 160.657395] apic_timer_interrupt+0xf/0x20 [ 160.657409] netlink_ack+0x2d3/0xb30 [ 160.657421] netlink_rcv_skb+0x382/0x460 [ 160.657434] rtnetlink_rcv+0x1d/0x30 [ 160.657449] netlink_unicast+0x537/0x720 [ 160.667439] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 160.671483] netlink_sendmsg+0x8ae/0xd70 [ 160.671500] sock_sendmsg+0xd7/0x130 [ 160.679730] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 160.680759] __sys_sendto+0x262/0x380 [ 160.694686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 160.698983] __x64_sys_sendto+0xe1/0x1a0 [ 160.699006] do_syscall_64+0xfd/0x620 [ 160.708377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 160.710603] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.710614] INITIAL USE [ 160.717553] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 160.722303] at: [ 160.722324] lock_acquire+0x16f/0x3f0 [ 160.722343] _raw_spin_lock_irq+0x60/0x80 [ 160.728586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 160.731755] io_submit_one+0xead/0x2eb0 [ 160.731772] __x64_sys_io_submit+0x1aa/0x520 [ 160.741116] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 160.744668] do_syscall_64+0xfd/0x620 [ 160.744683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.744686] } [ 160.744699] ... key at: [] __key.50211+0x0/0x40 [ 160.744701] ... acquired at: [ 160.744711] mark_lock+0x420/0x1370 [ 160.744718] __lock_acquire+0xc62/0x49c0 [ 160.744726] lock_acquire+0x16f/0x3f0 [ 160.744740] _raw_spin_lock_irq+0x60/0x80 [ 160.750964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 160.752183] free_ioctx_users+0x2d/0x490 [ 160.759027] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 160.762981] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 160.763000] rcu_process_callbacks+0xba0/0x1a30 [ 160.772923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.781991] __do_softirq+0x25c/0x921 [ 160.782004] irq_exit+0x180/0x1d0 [ 160.782014] smp_apic_timer_interrupt+0x13b/0x550 [ 160.782027] apic_timer_interrupt+0xf/0x20 [ 160.782040] netlink_ack+0x2d3/0xb30 [ 160.782050] netlink_rcv_skb+0x382/0x460 [ 160.782063] rtnetlink_rcv+0x1d/0x30 [ 160.782086] netlink_unicast+0x537/0x720 [ 160.790830] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.794460] netlink_sendmsg+0x8ae/0xd70 [ 160.794470] sock_sendmsg+0xd7/0x130 [ 160.794479] __sys_sendto+0x262/0x380 [ 160.794487] __x64_sys_sendto+0xe1/0x1a0 [ 160.794501] do_syscall_64+0xfd/0x620 [ 160.794514] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.794516] [ 160.794519] [ 160.794519] stack backtrace: [ 160.794533] CPU: 1 PID: 7688 Comm: syz-executor.5 Not tainted 4.19.68 #42 [ 160.794539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 160.794542] Call Trace: [ 160.794547] [ 160.794563] dump_stack+0x172/0x1f0 [ 160.794577] print_irq_inversion_bug.part.0+0x2c0/0x2cd [ 160.794587] check_usage_forwards.cold+0x20/0x29 [ 160.794598] ? check_usage_backwards+0x340/0x340 [ 160.794613] ? save_stack_trace+0x1a/0x20 [ 160.794623] ? save_trace+0xe0/0x290 [ 160.794633] mark_lock+0x420/0x1370 [ 160.794643] ? check_usage_backwards+0x340/0x340 [ 160.794653] __lock_acquire+0xc62/0x49c0 [ 160.794663] ? mark_held_locks+0x100/0x100 [ 160.794678] ? mark_held_locks+0x100/0x100 [ 160.794689] ? __wake_up_common_lock+0xfe/0x190 [ 160.794701] ? mark_held_locks+0x100/0x100 [ 160.794709] ? __wake_up_common_lock+0xfe/0x190 [ 160.794718] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 160.794727] ? lockdep_hardirqs_on+0x19b/0x5d0 [ 160.794740] ? trace_hardirqs_on+0x67/0x220 [ 160.794752] ? kasan_check_read+0x11/0x20 [ 160.794766] lock_acquire+0x16f/0x3f0 [ 160.799188] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 160.803765] ? free_ioctx_users+0x2d/0x490 [ 160.803780] _raw_spin_lock_irq+0x60/0x80 [ 160.803789] ? free_ioctx_users+0x2d/0x490 [ 160.803799] free_ioctx_users+0x2d/0x490 [ 160.803814] ? rcu_dynticks_curr_cpu_in_eqs+0x51/0xb0 [ 160.803829] percpu_ref_switch_to_atomic_rcu+0x407/0x540 [ 160.803840] ? percpu_ref_exit+0xd0/0xd0 [ 160.803851] rcu_process_callbacks+0xba0/0x1a30 [ 160.803864] ? __rcu_read_unlock+0x170/0x170 [ 160.803882] ? sched_clock+0x2e/0x50 [ 160.810783] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 160.815310] __do_softirq+0x25c/0x921 [ 160.815326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 160.815335] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 160.815353] irq_exit+0x180/0x1d0 [ 160.815364] smp_apic_timer_interrupt+0x13b/0x550 [ 160.815375] apic_timer_interrupt+0xf/0x20 [ 160.815380] [ 160.815395] RIP: 0010:netlink_ack+0x2d3/0xb30 [ 160.815408] Code: 48 8b 85 70 ff ff ff 48 8d 73 34 48 89 f1 48 89 b5 48 ff ff ff 48 c1 e9 03 8b 50 08 48 b8 00 00 00 00 00 fc ff df 0f b6 0c 01 <48> 89 f0 83 e0 07 83 c0 03 38 c8 7c 08 84 c9 0f 85 7f 07 00 00 8b [ 160.815413] RSP: 0018:ffff888061bc78f0 EFLAGS: 00000a07 ORIG_RAX: ffffffffffffff13 [ 160.815423] RAX: dffffc0000000000 RBX: ffff88809b2c13c0 RCX: 0000000000000000 [ 160.815428] RDX: 0000000000000000 RSI: ffff88809b2c13f4 RDI: ffff8880998a9308 [ 160.815434] RBP: ffff888061bc79b0 R08: 0000000000000014 R09: ffffed101270750d [ 160.815440] R10: ffffed101270750c R11: ffff88809383a863 R12: ffff8880997b5300 [ 160.815445] R13: 0000000000000024 R14: 0000000000000100 R15: 0000000000000000 [ 160.815461] ? netlink_sendmsg+0xd70/0xd70 [ 160.815470] ? netlink_deliver_tap+0x22d/0xc20 [ 160.815484] ? find_held_lock+0x35/0x130 [ 160.815502] netlink_rcv_skb+0x382/0x460 [ 160.824840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 160.830152] ? rtnetlink_put_metrics+0x560/0x560 [ 160.839901] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 160.841568] ? netlink_ack+0xb30/0xb30 [ 160.841589] ? kasan_check_read+0x11/0x20 [ 160.848014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 160.853010] ? netlink_deliver_tap+0x254/0xc20 [ 160.853034] rtnetlink_rcv+0x1d/0x30 [ 160.859121] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 160.863836] netlink_unicast+0x537/0x720 [ 160.863849] ? netlink_attachskb+0x770/0x770 [ 160.863865] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 160.863876] netlink_sendmsg+0x8ae/0xd70 [ 160.863889] ? netlink_unicast+0x720/0x720 [ 160.863904] ? selinux_socket_sendmsg+0x36/0x40 [ 160.863914] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 160.863925] ? security_socket_sendmsg+0x8d/0xc0 [ 160.863937] ? netlink_unicast+0x720/0x720 [ 160.863948] sock_sendmsg+0xd7/0x130 [ 160.863959] __sys_sendto+0x262/0x380 [ 160.863971] ? __ia32_sys_getpeername+0xb0/0xb0 [ 160.863982] ? task_work_run+0x118/0x1c0 [ 160.863995] ? find_held_lock+0x35/0x130 [ 160.864008] ? lockdep_hardirqs_on+0x415/0x5d0 [ 160.864026] ? blkg_prfill_rwstat_field_recursive+0x100/0x100 [ 160.864042] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 160.864053] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 160.864064] ? do_syscall_64+0x26/0x620 [ 160.864079] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.864090] __x64_sys_sendto+0xe1/0x1a0 [ 160.864102] do_syscall_64+0xfd/0x620 [ 160.864117] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 160.872057] bridge0: port 1(bridge_slave_0) entered blocking state [ 160.875268] RIP: 0033:0x4136c3 [ 160.875284] Code: ff 0f 83 b0 19 00 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 83 3d cd 2b 66 00 00 75 17 49 89 ca b8 2c 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 81 19 00 00 c3 48 83 ec 08 e8 87 fa ff ff [ 160.875289] RSP: 002b:00007ffcc2887e58 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 160.875301] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004136c3 [ 160.875307] RDX: 000000000000002c RSI: 0000000000a70070 RDI: 0000000000000003 [ 160.875312] RBP: 0000000000000000 R08: 00007ffcc2887e60 R09: 000000000000000c [ 160.875317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 160.875322] R13: 0000000000000003 R14: 00007ffcc2887f08 R15: 0000000000000000 [ 161.984363] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.994938] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.002766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 15:13:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 162.010635] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.019477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.021935] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 162.026927] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.034802] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.041594] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.057554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.067456] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.075436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.083191] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.091055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.098601] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.106094] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.113687] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.121141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.128996] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.138632] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.145118] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.152806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 162.162469] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 162.169472] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.176908] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.184072] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.191781] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.200753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 15:13:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 162.208878] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.225156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.236828] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 162.238046] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 162.252402] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 162.261524] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.269588] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 162.279390] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 162.287258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.296180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.304299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 15:13:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) ioctl$SG_GET_SCSI_ID(r0, 0x2276, &(0x7f0000000100)) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 162.311864] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.318286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.325404] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.333129] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.340899] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.347319] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.354392] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 162.360857] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.370672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.378380] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.386040] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.394953] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 162.402286] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 15:13:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r4, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 162.410335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.422033] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.429609] kobject: 'vlan0' (00000000a3cb8ec2): kobject_add_internal: parent: 'mesh', set: '' [ 162.443698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.452719] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 162.461601] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 162.462721] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.496542] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 162.505448] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.515337] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 162.527788] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.538621] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 162.547073] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 162.556779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 15:13:31 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) [ 162.564408] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 162.577029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.594151] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 162.598455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.601217] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.634350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.665992] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.680452] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 162.689868] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.699945] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 162.700508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.712257] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 162.717750] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 162.731090] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 162.732290] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 162.744820] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 162.758211] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.768271] kobject: 'vlan0' (00000000b0a1e278): kobject_add_internal: parent: 'mesh', set: '' [ 162.790578] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 162.802977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 162.813020] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.819261] kobject: 'vlan0' (0000000064cf35f1): kobject_add_internal: parent: 'mesh', set: '' [ 162.831075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.839161] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.846780] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.854223] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 162.866746] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 162.872870] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.894475] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 162.898271] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 162.900959] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 162.919278] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.929515] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 162.939495] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 162.943350] kobject: 'loop2' (0000000087ac080d): kobject_uevent_env [ 162.954390] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.962138] kobject: 'loop2' (0000000087ac080d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 162.964524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.983955] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.990387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.001352] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.007965] kobject: 'vlan0' (0000000032fad1b3): kobject_add_internal: parent: 'mesh', set: '' 15:13:32 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "0fe31d6f7840315d", "4c6ecc0da9bc06c2eeb0738371ffc6eb1373b69128754baba506b74c805ab546", "1fdcf5c3", "17e6573038191760"}, 0x38) [ 163.020404] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 163.029228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.036862] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.045127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.052814] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.059242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.071216] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 163.079695] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 163.079888] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.097375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.113037] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 163.130069] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 163.137390] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.144384] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env [ 163.146062] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.151077] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 163.158978] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.177979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 163.188466] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 163.198349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.212831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.228097] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 163.244020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.251748] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.261563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 163.268851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.277045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 163.289493] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env [ 163.290570] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 163.303096] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 163.305755] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 163.318652] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 163.338783] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 163.348625] kobject: 'vlan0' (00000000cc90fa6c): kobject_add_internal: parent: 'mesh', set: '' [ 163.372694] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 163.379741] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 163.394557] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 163.401046] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' 15:13:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 15:13:33 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) 15:13:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 15:13:33 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 15:13:33 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "0fe31d6f7840315d", "4c6ecc0da9bc06c2eeb0738371ffc6eb1373b69128754baba506b74c805ab546", "1fdcf5c3", "17e6573038191760"}, 0x38) 15:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") getrlimit(0x0, &(0x7f00000000c0)) 15:13:33 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_submit(0x0, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r3, 0x0}]) 15:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") getrlimit(0x0, &(0x7f00000000c0)) [ 163.826058] kobject: 'loop2' (0000000087ac080d): kobject_uevent_env [ 163.832552] kobject: 'loop2' (0000000087ac080d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:13:33 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 163.898206] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 163.919865] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") getrlimit(0x0, &(0x7f00000000c0)) 15:13:33 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 163.946833] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 163.955776] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 163.976180] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env 15:13:33 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) write$P9_RCREATE(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) [ 163.997731] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.041467] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env [ 164.049211] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.078407] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 164.094331] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.113769] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 164.120526] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 164.131066] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 164.154684] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 164.169943] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env [ 164.176878] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 164.224186] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 164.230855] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' 15:13:33 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 15:13:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 15:13:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x11000008912, &(0x7f0000000000)="11dca50d6c0bcfe47bf070") 15:13:33 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) 15:13:33 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 15:13:33 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{}, "0fe31d6f7840315d", "4c6ecc0da9bc06c2eeb0738371ffc6eb1373b69128754baba506b74c805ab546", "1fdcf5c3", "17e6573038191760"}, 0x38) 15:13:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) [ 164.721270] kobject: 'loop2' (0000000087ac080d): kobject_uevent_env [ 164.758205] kobject: 'loop2' (0000000087ac080d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:13:34 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) tkill(r0, 0x1000000000016) 15:13:34 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) utimensat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r1, r2/1000+10000}}, 0x891c939080da3ea8) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r3, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0}]) [ 164.782752] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 164.809956] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' 15:13:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) [ 164.844203] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env [ 164.850717] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:13:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) [ 164.900188] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 164.915074] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 164.935098] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env 15:13:34 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f0000000040)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 164.949203] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 164.986531] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 164.996693] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.047978] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 165.054858] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 165.076020] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 165.082619] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 165.093316] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 165.102917] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:13:34 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 15:13:34 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) 15:13:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 15:13:34 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 165.556226] kobject: 'loop2' (0000000087ac080d): kobject_uevent_env [ 165.562724] kobject: 'loop2' (0000000087ac080d): fill_kobj_path: path = '/devices/virtual/block/loop2' 15:13:34 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cuse\x00', 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:13:34 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 165.666499] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 165.673464] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:13:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) [ 165.711407] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 165.726126] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 165.752183] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 165.778446] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 165.799270] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 165.806150] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 165.816346] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 165.822792] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 166.401716] kobject: 'loop2' (0000000087ac080d): kobject_uevent_env [ 166.408532] kobject: 'loop2' (0000000087ac080d): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 166.536488] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 166.543040] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' 15:13:37 executing program 3: open(0x0, 0x0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xfffffffffffffe47) r0 = gettid() setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xaa) ptrace$getregs(0xc, 0x0, 0x0, 0x0) prlimit64(0x0, 0xc2fad07d27f2c9c9, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setpgid(0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)=""/8, 0x0) tkill(r0, 0x1000000000016) 15:13:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 15:13:37 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 15:13:37 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:13:37 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 15:13:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000180)=""/11, 0xed) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(r0, 0x401845c0, 0x0) 15:13:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 167.869806] kobject: 'loop3' (00000000e5c3ccc8): kobject_uevent_env [ 167.885776] kobject: 'loop3' (00000000e5c3ccc8): fill_kobj_path: path = '/devices/virtual/block/loop3' 15:13:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) 15:13:37 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, 0x0, 0x82, 0x0) io_setup(0x9, &(0x7f0000000180)=0x0) io_submit(r1, 0x1, &(0x7f0000000440)=[&(0x7f0000000080)={0x4, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 167.925241] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 167.937254] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' 15:13:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) [ 167.981258] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 167.991161] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' 15:13:37 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) 15:13:37 executing program 1: clone(0x100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x2b9) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000140)='./file0\x00', 0x841, 0x0) [ 168.021792] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 168.042505] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 168.088898] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 168.095451] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 168.112508] kobject: 'loop4' (00000000d94d5ef2): kobject_uevent_env [ 168.125226] kobject: 'loop4' (00000000d94d5ef2): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 168.139595] kobject: 'loop0' (00000000e2b69437): kobject_uevent_env [ 168.146518] kobject: 'loop0' (00000000e2b69437): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 168.218612] kobject: 'loop1' (0000000088d86cec): kobject_uevent_env [ 168.225384] kobject: 'loop1' (0000000088d86cec): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 168.692031] kobject: 'loop5' (000000001815eda7): kobject_uevent_env [ 168.698650] kobject: 'loop5' (000000001815eda7): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 168.708817] kobject: 'loop2' (0000000087ac080d): kobject_uevent_env [ 168.715369] kobject: 'loop2' (0000000087ac080d): fill_kobj_path: path = '/devices/virtual/block/loop2'