x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1546.368757][T26118] bond0: (slave bond_slave_1): Releasing backup interface 03:48:34 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2100}]}, 0x10) [ 1546.464404][T26119] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1546.478608][T26122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:34 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1546.527820][T26226] bond0: (slave bond_slave_1): Releasing backup interface [ 1546.551766][T26226] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1546.686442][T26226] device bond_slave_1 left promiscuous mode [ 1546.714776][T26229] bond0: (slave bond_slave_1): Releasing backup interface 03:48:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1546.848459][T26231] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1546.873336][T26236] bond0: (slave bond_slave_1): Releasing backup interface [ 1547.043451][T26349] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1547.066177][T26241] bond0: (slave bond_slave_1): Releasing backup interface 03:48:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:35 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2400}]}, 0x10) [ 1547.085500][T26241] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1547.170523][T26242] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1547.186900][T26254] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1547.200905][T26276] device bond_slave_1 entered promiscuous mode 03:48:35 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1547.223070][T26276] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:35 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1547.270399][T26348] bond0: (slave bond_slave_1): Releasing backup interface 03:48:35 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00z\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:35 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1547.426398][T26356] bond0: (slave bond_slave_1): Releasing backup interface [ 1547.450086][T26356] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1547.560097][T26449] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1547.584627][T26461] bond0: (slave bond_slave_1): Releasing backup interface 03:48:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1547.622009][T26461] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:36 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2500}]}, 0x10) [ 1547.716218][T26461] device bond_slave_1 left promiscuous mode [ 1547.741215][T26462] bond0: (slave bond_slave_1): Releasing backup interface [ 1547.884742][T26464] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1547.911172][T26571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1547.942969][T26572] bond0: (slave bond_slave_1): Releasing backup interface [ 1547.956343][T26572] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1548.031019][T26463] device bond_slave_1 entered promiscuous mode [ 1548.044193][T26463] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.076727][T26576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.107057][T26584] bond0: (slave bond_slave_1): Releasing backup interface 03:48:36 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\xff\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1548.299551][T26583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.320522][T26586] bond0: (slave bond_slave_1): Releasing backup interface 03:48:36 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1548.460741][T26587] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.493127][T26693] bond0: (slave bond_slave_1): Releasing backup interface 03:48:36 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2800}]}, 0x10) [ 1548.514809][T26693] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1548.596649][T26693] device bond_slave_1 left promiscuous mode [ 1548.627137][T26692] bond0: (slave bond_slave_1): Releasing backup interface 03:48:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1548.634455][T26692] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1548.732908][T26695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1548.776377][T26699] bond0: (slave bond_slave_1): Releasing backup interface 03:48:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1548.994836][T26805] device bond_slave_1 entered promiscuous mode [ 1549.018219][T26805] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1549.063469][T26808] bond0: (slave bond_slave_1): Releasing backup interface 03:48:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00 '}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:37 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2c00}]}, 0x10) [ 1549.242027][T26811] bond0: (slave bond_slave_1): Releasing backup interface [ 1549.260800][T26811] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1549.350659][T26901] bond0: (slave bond_slave_1): Releasing backup interface [ 1549.375774][T26901] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:37 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1549.486521][T26901] device bond_slave_1 left promiscuous mode 03:48:37 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1549.559224][T26930] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1549.601148][T26923] device bond_slave_1 entered promiscuous mode [ 1549.616679][T26923] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1549.665036][T26936] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x04\x00'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1549.728787][T26938] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:38 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1549.875078][T27042] bond0: (slave bond_slave_1): Releasing backup interface [ 1549.906739][T27042] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1549.976558][T27042] device bond_slave_1 left promiscuous mode [ 1550.028377][T27045] bond0: (slave bond_slave_1): Releasing backup interface 03:48:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:38 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2d00}]}, 0x10) 03:48:38 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f\x00'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1550.351779][T27049] bond0: (slave bond_slave_1): Releasing backup interface 03:48:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1550.488533][T27052] bond0: (slave bond_slave_1): Releasing backup interface 03:48:38 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3000}]}, 0x10) 03:48:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x03'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00!\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1550.882135][T27272] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1550.947143][T27277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1551.005361][T27283] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1551.047312][T27282] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00!\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e\x04'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:39 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1551.292736][T27389] bond0: (slave bond_slave_1): Releasing backup interface [ 1551.316097][T27389] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1551.443890][T27393] bond0: (slave bond_slave_1): Releasing backup interface 03:48:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1551.695086][T27397] bond0: (slave bond_slave_1): Releasing backup interface 03:48:40 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3400}]}, 0x10) 03:48:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00!\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1551.919240][T27499] bond0: (slave bond_slave_1): Releasing backup interface 03:48:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1552.217243][T27395] device bond_slave_1 entered promiscuous mode [ 1552.223843][T27395] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:40 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x05'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:40 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:40 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3500}]}, 0x10) [ 1552.478290][T27617] bond0: (slave bond_slave_1): Releasing backup interface [ 1552.509645][T27617] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1552.616435][T27617] device bond_slave_1 left promiscuous mode 03:48:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x06'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1552.929300][T27734] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:41 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1552.995438][T27737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1553.037493][T27738] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1553.076843][T27776] device bond_slave_1 entered promiscuous mode 03:48:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1553.105298][T27776] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1553.154454][T27847] bond0: (slave bond_slave_1): Releasing backup interface [ 1553.181830][T27847] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1553.299147][T27847] device bond_slave_1 left promiscuous mode [ 1553.312144][T27848] bond0: (slave bond_slave_1): Releasing backup interface 03:48:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\a'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:41 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3c00}]}, 0x10) 03:48:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1553.585657][T27854] bond0: (slave bond_slave_1): Releasing backup interface 03:48:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1553.739432][T27857] bond0: (slave bond_slave_1): Releasing backup interface 03:48:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1553.985697][T27973] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1554.031056][T27962] device bond_slave_1 entered promiscuous mode [ 1554.046228][T27962] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:42 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x02\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1554.309428][T27977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1554.338325][T27981] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1554.360551][T27979] bond0: (slave bond_slave_1): Releasing backup interface [ 1554.381595][T27979] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:42 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:42 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3d00}]}, 0x10) [ 1554.456307][T27979] device bond_slave_1 left promiscuous mode [ 1554.494448][T27988] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:42 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1554.535868][T27986] device bond_slave_1 entered promiscuous mode [ 1554.542295][T27986] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1554.612893][T28092] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1554.647181][T28095] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x03\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1554.738666][T28098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1554.793673][T28104] bond0: (slave bond_slave_1): Releasing backup interface 03:48:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1554.832907][T28104] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1554.917067][T28104] device bond_slave_1 left promiscuous mode [ 1554.938575][T28106] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1554.951332][T28108] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1554.976007][T28111] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.063453][T28214] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x04\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.209345][T28220] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1555.282685][T28222] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.323449][T28227] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1555.359492][T28224] device bond_slave_1 entered promiscuous mode [ 1555.420464][T28224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:43 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4000}]}, 0x10) 03:48:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.466280][T28333] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1555.509107][T28331] bond0: (slave bond_slave_1): Releasing backup interface 03:48:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.549318][T28331] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:43 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.645968][T28331] device bond_slave_1 left promiscuous mode [ 1555.663038][T28337] bond0: (slave bond_slave_1): Releasing backup interface 03:48:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x05\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1555.915876][T28338] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1555.929025][T28447] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1555.961025][T28452] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1555.984080][T28456] device bond_slave_1 entered promiscuous mode [ 1556.014668][T28456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x06\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1556.289021][T28460] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1556.323042][T28458] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1556.365961][T28465] bond0: (slave bond_slave_1): Releasing backup interface [ 1556.401187][T28465] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:44 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:44 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4400}]}, 0x10) 03:48:44 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1556.496579][T28465] device bond_slave_1 left promiscuous mode [ 1556.511937][T28464] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1556.534157][T28560] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1556.547771][T28574] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1556.641349][T28576] bond0: (slave bond_slave_1): Releasing backup interface 03:48:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\a\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1556.968563][T28676] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1556.991487][T28686] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1557.010992][T28691] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1557.062982][T28692] device bond_slave_1 entered promiscuous mode [ 1557.112246][T28692] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\b\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1557.291567][T28698] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1557.341471][T28696] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1557.394036][T28700] bond0: (slave bond_slave_1): Releasing backup interface [ 1557.412373][T28700] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:45 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4500}]}, 0x10) 03:48:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:45 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1557.506326][T28700] device bond_slave_1 left promiscuous mode [ 1557.530667][T28804] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1557.558534][T28736] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1557.629951][T28812] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1557.719534][T28814] bond0: (slave bond_slave_1): Releasing backup interface 03:48:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1558.023956][T28890] device bond_slave_1 entered promiscuous mode [ 1558.048884][T28890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:46 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1558.074350][T28888] bond0: (slave bond_slave_1): Releasing backup interface 03:48:46 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00!\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1558.410303][T28892] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1558.429680][T28927] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1558.467544][T28933] bond0: (slave bond_slave_1): Releasing backup interface [ 1558.495679][T28933] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:46 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4800}]}, 0x10) 03:48:46 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:46 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:46 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1558.646918][T28933] device bond_slave_1 left promiscuous mode [ 1558.706453][T29040] bond0: (slave bond_slave_1): Releasing backup interface [ 1558.728969][T29040] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1558.832731][T28982] device bond_slave_1 entered promiscuous mode [ 1558.850865][T28982] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1558.883033][T29042] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1558.914061][T29047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00H\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:47 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:47 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1559.085818][T29152] bond0: (slave bond_slave_1): Releasing backup interface [ 1559.104690][T29152] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1559.246591][T29152] device bond_slave_1 left promiscuous mode [ 1559.283501][T29160] bond0: (slave bond_slave_1): Releasing backup interface 03:48:47 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4c00}]}, 0x10) 03:48:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1559.551917][T29163] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1559.569644][T29154] device bond_slave_1 entered promiscuous mode [ 1559.585300][T29154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00L\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1559.933127][T29283] bond0: (slave bond_slave_1): Releasing backup interface [ 1559.978657][T29283] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.119918][T29283] device bond_slave_1 left promiscuous mode [ 1560.163702][T29285] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1560.211225][T29286] device bond_slave_1 entered promiscuous mode 03:48:48 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.257030][T29286] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:48 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4d00}]}, 0x10) 03:48:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.383342][T29397] bond0: (slave bond_slave_1): Releasing backup interface 03:48:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00`\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.675794][T29506] bond0: (slave bond_slave_1): Releasing backup interface 03:48:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.727109][T29506] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.856925][T29506] device bond_slave_1 left promiscuous mode 03:48:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1560.939906][T29511] device bond_slave_1 entered promiscuous mode [ 1560.964776][T29511] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:49 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00h\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1561.320582][T29529] bond0: (slave bond_slave_1): Releasing backup interface 03:48:49 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000}]}, 0x10) 03:48:49 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1561.369367][T29529] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1561.466537][T29529] device bond_slave_1 left promiscuous mode 03:48:49 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:49 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1561.526449][T29530] device bond_slave_1 entered promiscuous mode [ 1561.560884][T29530] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) 03:48:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00l\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00`\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) 03:48:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1561.919740][T29548] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1561.975217][T29550] bond0: (slave bond_slave_1): Releasing backup interface [ 1562.015829][T29550] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1562.106466][T29550] device bond_slave_1 left promiscuous mode [ 1562.150162][T29662] bond0: (slave bond_slave_1): Releasing backup interface 03:48:50 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5400}]}, 0x10) 03:48:50 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, 0x0) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:50 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:50 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00t\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1562.543478][T29667] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:50 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1562.666546][T29701] device bond_slave_1 entered promiscuous mode 03:48:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1562.712618][T29701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db5"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1562.806238][T29780] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:48:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:51 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00z\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1562.911127][T29787] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1562.950444][T29792] bond0: (slave bond_slave_1): Releasing backup interface 03:48:51 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1563.188144][T29790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1563.220981][T29898] bond0: (slave bond_slave_1): Releasing backup interface [ 1563.242546][T29898] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1563.326440][T29898] device bond_slave_1 left promiscuous mode 03:48:51 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5c00}]}, 0x10) 03:48:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1563.378432][T29902] bond0: (slave bond_slave_1): Releasing backup interface 03:48:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1563.650035][T29911] bond0: (slave bond_slave_1): Releasing backup interface [ 1563.675763][T29911] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\n'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) 03:48:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1563.919026][T30019] device bond_slave_1 entered promiscuous mode [ 1563.937245][T30019] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1564.021147][T30022] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1564.060403][T30024] bond0: (slave bond_slave_1): Releasing backup interface [ 1564.098392][T30024] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00t\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:52 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1564.169558][T30024] device bond_slave_1 left promiscuous mode [ 1564.240889][T30133] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:52 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\v'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1564.350012][T30136] bond0: (slave bond_slave_1): Releasing backup interface 03:48:52 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x6000}]}, 0x10) 03:48:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) 03:48:52 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) 03:48:52 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x06\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1564.638247][T30146] bond0: (slave bond_slave_1): Releasing backup interface 03:48:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1564.915723][T30140] device bond_slave_1 entered promiscuous mode [ 1564.922205][T30140] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:53 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\f'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1565.029956][T30259] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1565.148790][T30361] bond0: (slave bond_slave_1): Releasing backup interface [ 1565.221800][T30361] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:53 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1565.327069][T30361] device bond_slave_1 left promiscuous mode 03:48:53 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x6100}]}, 0x10) 03:48:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1565.398064][T30370] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1565.424595][T30372] bond0: (slave bond_slave_1): Releasing backup interface 03:48:53 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:53 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e\f'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1565.708527][T30373] device bond_slave_1 entered promiscuous mode [ 1565.715115][T30373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1565.735100][T30484] bond0: (slave bond_slave_1): Releasing backup interface 03:48:54 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc4"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\v\xf0'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1566.003205][T30587] bond0: (slave bond_slave_1): Releasing backup interface [ 1566.031879][T30587] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1566.109475][T30587] device bond_slave_1 left promiscuous mode 03:48:54 executing program 2: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x74}]}, 0x10) 03:48:54 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x6400}]}, 0x10) 03:48:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\v\xf0'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\r'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1566.237601][T30600] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1566.435822][T30706] device bond_slave_1 entered promiscuous mode 03:48:54 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1566.482152][T30706] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1566.536490][T30708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1566.563926][T30713] bond0: (slave bond_slave_1): Releasing backup interface [ 1566.594339][T30713] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\v\xf0'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1566.737254][T30713] device bond_slave_1 left promiscuous mode [ 1566.783656][T30717] bond0: (slave bond_slave_1): Releasing backup interface 03:48:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x0f'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.021781][T30823] bond0: (slave bond_slave_1): Releasing backup interface [ 1567.050615][T30823] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x03$\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.155010][T30828] device bond_slave_1 entered promiscuous mode 03:48:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.213175][T30828] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1567.271172][T30830] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0et'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:55 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x6c00}]}, 0x10) 03:48:55 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f\x10'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.336496][T30834] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:55 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0et'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.433286][T30898] bond0: (slave bond_slave_1): Releasing backup interface 03:48:55 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.471853][T30898] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1567.559069][T30898] device bond_slave_1 left promiscuous mode 03:48:55 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0et'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.609781][T30954] bond0: (slave bond_slave_1): Releasing backup interface [ 1567.634305][T30954] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1567.738539][T30951] bond0: (slave bond_slave_1): Releasing backup interface 03:48:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1567.997211][T30946] device bond_slave_1 entered promiscuous mode [ 1568.003690][T30946] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:56 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7400}]}, 0x10) 03:48:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x13'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:56 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:56 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:56 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0et'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1568.283620][T31069] bond0: (slave bond_slave_1): Releasing backup interface [ 1568.301986][T31069] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1568.419779][T31069] device bond_slave_1 left promiscuous mode [ 1568.481696][T31151] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:56 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x14'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1568.779746][T31184] device bond_slave_1 entered promiscuous mode [ 1568.797625][T31184] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1568.851001][T31187] bond0: (slave bond_slave_1): Releasing backup interface 03:48:57 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7c00}]}, 0x10) 03:48:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1569.157146][T31193] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1569.177065][T31190] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x15'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1569.207834][T31197] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:57 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:57 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x15\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1569.324067][T31306] bond0: (slave bond_slave_1): Releasing backup interface [ 1569.352899][T31306] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:57 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1569.436464][T31306] device bond_slave_1 left promiscuous mode 03:48:57 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1569.512278][T31309] device bond_slave_1 entered promiscuous mode [ 1569.556439][T31309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1569.605874][T31314] bond0: (slave bond_slave_1): Releasing backup interface 03:48:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x14\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x16'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:58 executing program 0: getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce, 0x5, 0x0, 0x0, 0x3]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(r4, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') close(r7) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r9, 0x2, 0xb8, 0x1, 0x20}, &(0x7f0000000100)=0x14) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:48:58 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7c03}]}, 0x10) [ 1569.918045][T31418] bond0: (slave bond_slave_1): Releasing backup interface 03:48:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1570.285502][T31423] bond0: (slave bond_slave_1): Releasing backup interface [ 1570.317114][T31423] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1570.406658][T31423] device bond_slave_1 left promiscuous mode 03:48:58 executing program 0: getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce, 0x5, 0x0, 0x0, 0x3]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(r4, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') close(r7) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r9, 0x2, 0xb8, 0x1, 0x20}, &(0x7f0000000100)=0x14) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:48:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x14\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:58 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r4, 0x0) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}) r5 = dup2(r4, r2) accept4(r5, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:48:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x16\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1570.493724][T31428] device bond_slave_1 entered promiscuous mode [ 1570.510257][T31428] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1570.651811][T31583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x18'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1570.741859][T31645] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:48:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x14\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:59 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8100}]}, 0x10) [ 1570.863200][T31651] bond0: (slave bond_slave_1): Releasing backup interface [ 1570.882034][T31651] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\xc0\x0e\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1571.029042][T31653] bond0: (slave bond_slave_1): Releasing backup interface [ 1571.045791][T31653] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:48:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\f\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1571.127435][T31653] device bond_slave_1 left promiscuous mode [ 1571.163431][T31660] bond0: (slave bond_slave_1): Releasing backup interface 03:48:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f\x18'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:59 executing program 0: getpid() r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r0, 0x5, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce, 0x5, 0x0, 0x0, 0x3]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(r4, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') close(r7) r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r7, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, r9}, 0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r6, 0x84, 0x1, &(0x7f00000000c0)={r9, 0x2, 0xb8, 0x1, 0x20}, &(0x7f0000000100)=0x14) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:48:59 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8400}]}, 0x10) 03:48:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\f\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:48:59 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\n\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1571.604634][T31671] device bond_slave_1 entered promiscuous mode [ 1571.641324][T31671] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x1b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!z\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1571.830903][T31720] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1571.858749][T31786] bond0: (slave bond_slave_1): Releasing backup interface [ 1571.873961][T31786] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1571.966483][T31786] device bond_slave_1 left promiscuous mode 03:49:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!t\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1572.175173][T31793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:00 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\x1e'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\f\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!z\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1572.321558][T31796] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:00 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\n\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1572.364931][T31799] bond0: (slave bond_slave_1): Releasing backup interface [ 1572.380214][T31799] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:00 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!t\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1572.502628][T31906] bond0: (slave bond_slave_1): Releasing backup interface 03:49:00 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!z\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:00 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8700}]}, 0x10) 03:49:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!h\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00 '}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1572.770699][T31912] bond0: (slave bond_slave_1): Releasing backup interface 03:49:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!`\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1573.026128][T32026] device bond_slave_1 entered promiscuous mode [ 1573.032761][T32026] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!h\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!!\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:01 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!t\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:01 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f '}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:01 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!`\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1573.289651][T32030] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1573.316406][T32036] bond0: (slave bond_slave_1): Releasing backup interface [ 1573.333964][T32036] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!h\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:01 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x9400}]}, 0x10) [ 1573.426373][T32036] device bond_slave_1 left promiscuous mode [ 1573.463144][T32032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1573.540686][T32145] bond0: (slave bond_slave_1): Releasing backup interface [ 1573.576074][T32145] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:01 executing program 0: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={[{@fat=@time_offset={'time_offset', 0x3d, 0x42b}}]}) 03:49:01 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!!\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!`\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e$'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1573.724154][T32151] bond0: (slave bond_slave_1): Releasing backup interface 03:49:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\b\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1573.970614][T32145] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1574.010516][T32256] device bond_slave_1 entered promiscuous mode [ 1574.032495][T32256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\b\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:02 executing program 5: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(r4, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xe8030000) 03:49:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x05\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00%'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:02 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(r4, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(r4, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0xc0000020) [ 1574.229941][T32267] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1574.267565][T32271] bond0: (slave bond_slave_1): Releasing backup interface [ 1574.275977][T32271] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1574.336404][T32271] device bond_slave_1 left promiscuous mode 03:49:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\b\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1574.404226][T32276] device bond_slave_1 entered promiscuous mode [ 1574.432247][T32276] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:02 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x9c00}]}, 0x10) 03:49:02 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x05\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:02 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\t('}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1574.600923][T32380] bond0: (slave bond_slave_1): Releasing backup interface 03:49:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!%\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1574.777488][T32488] bond0: (slave bond_slave_1): Releasing backup interface [ 1574.798318][T32488] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x05\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00%!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1574.886539][T32488] device bond_slave_1 left promiscuous mode 03:49:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!%\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1575.080120][T32496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1575.140825][T32498] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nz!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\v('}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:03 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nt!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00%!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1575.341670][T32601] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1575.398603][T32605] device bond_slave_1 entered promiscuous mode [ 1575.417350][T32605] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:03 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xa400}]}, 0x10) 03:49:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1575.455796][T32611] bond0: (slave bond_slave_1): Releasing backup interface [ 1575.469213][T32611] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1575.538633][T32611] device bond_slave_1 left promiscuous mode [ 1575.578372][T32612] bond0: (slave bond_slave_1): Releasing backup interface 03:49:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f('}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1575.787363][T32610] bond0: (slave bond_slave_1): Releasing backup interface 03:49:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n`!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1576.028529][T32607] bond0: (slave bond_slave_1): Releasing backup interface [ 1576.043868][T32607] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00%!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:04 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xac00}]}, 0x10) [ 1576.150473][T32719] bond0: (slave bond_slave_1): Releasing backup interface 03:49:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nz!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:04 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n`!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e,'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nz!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x00 !!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1576.638020][ T369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1576.672885][ T371] device bond_slave_1 entered promiscuous mode [ 1576.692751][ T371] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1576.726723][ T373] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x00 !!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1576.765722][ T375] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1576.806955][ T378] bond0: (slave bond_slave_1): Releasing backup interface [ 1576.823171][ T378] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n!!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1576.929172][ T378] device bond_slave_1 left promiscuous mode [ 1576.957984][ T485] bond0: (slave bond_slave_1): Releasing backup interface 03:49:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f0'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x00 !!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 03:49:05 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xb100}]}, 0x10) [ 1577.206431][ T488] bond0: (slave bond_slave_1): Releasing backup interface 03:49:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x06!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1577.445253][ T492] bond0: (slave bond_slave_1): Releasing backup interface [ 1577.461555][ T492] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:05 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:05 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x06!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1577.581856][ T496] device bond_slave_1 entered promiscuous mode [ 1577.606195][ T496] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n!!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x00 !!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 03:49:06 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e4'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1577.764125][ T607] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1577.826774][ T609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1577.909702][ T611] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1577.942596][ T615] bond0: (slave bond_slave_1): Releasing backup interface 03:49:06 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03%\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1577.976484][ T615] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x18\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1578.077153][ T615] device bond_slave_1 left promiscuous mode 03:49:06 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xdc00}]}, 0x10) [ 1578.147350][ T616] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1578.182078][ T623] bond0: (slave bond_slave_1): Releasing backup interface 03:49:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x10\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1578.426628][ T622] bond0: (slave bond_slave_1): Releasing backup interface 03:49:06 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1578.677767][ T626] device bond_slave_1 entered promiscuous mode [ 1578.684275][ T626] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1578.715228][ T628] bond0: (slave bond_slave_1): Releasing backup interface 03:49:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1578.740419][ T628] bond0: (slave bond_slave_1): the permanent HWaddr of slave - da:2d:b8:b0:cb:8e - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f8'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1578.840029][ T634] bond0: (slave bond_slave_1): Releasing backup interface 03:49:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e4'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:07 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xf0000}]}, 0x10) [ 1579.058327][ T741] bond0: (slave bond_slave_1): Releasing backup interface [ 1579.082768][ T741] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 03:49:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 03:49:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x10\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1579.169624][ T741] device bond_slave_1 left promiscuous mode 03:49:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f<'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1579.290126][ T751] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1579.326376][ T754] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e4'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1579.461582][ T858] device bond_slave_1 entered promiscuous mode 03:49:07 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1579.508952][ T858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:07 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\x10\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1579.590527][ T859] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:49:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e<'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e4'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1579.736332][ T869] bond0: (slave bond_slave_1): Releasing backup interface 03:49:08 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x200000}]}, 0x10) [ 1579.950154][ T867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1579.968610][ T870] bond0: (slave bond_slave_1): Releasing backup interface 03:49:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f8'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:08 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text32={0x20, &(0x7f0000000180)="b93a1001c00f32b8010000000f01d9660f23969a617a9394a500b9d5090000b8b2000000ba000000000f30f40f01c2c4e2791c466db8010000000f01d92e64670f01cf"}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ce]}) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, 0x8) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) accept4(r4, 0x0, 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x4, 0x5, 0x81, 0xaa, 0x400}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x600) [ 1580.256153][ T907] bond0: (slave bond_slave_1): Releasing backup interface [ 1580.275855][ T907] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:08 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1580.366453][ T907] device bond_slave_1 left promiscuous mode 03:49:08 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1580.443028][ T991] device bond_slave_1 entered promiscuous mode [ 1580.456029][ T991] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x10\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:08 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f8'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:08 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f@'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1580.581102][ T996] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1580.617167][ T994] bond0: (slave bond_slave_1): Releasing backup interface 03:49:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:09 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x500000}]}, 0x10) [ 1580.875797][ T1000] bond0: (slave bond_slave_1): Releasing backup interface [ 1580.897665][ T1000] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:09 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f8'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1580.966475][ T1000] device bond_slave_1 left promiscuous mode [ 1581.014542][ T1116] bond0: (slave bond_slave_1): Releasing backup interface 03:49:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x10\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1581.269027][ T1112] device bond_slave_1 entered promiscuous mode [ 1581.286190][ T1112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x10\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:09 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, 0x0) 03:49:09 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:09 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\fD'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1581.565475][ T1238] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1581.667783][ T1240] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1581.703982][ T1244] bond0: (slave bond_slave_1): Releasing backup interface 03:49:10 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1000000}]}, 0x10) 03:49:10 executing program 2: r0 = socket(0x200000000000011, 0x80002, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6a) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'ip6gre0\x00', 0x0}) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@ll={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x80, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) [ 1581.731377][ T1244] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:10 executing program 0: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) getpid() openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getpgid(0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000580)) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) gettid() syz_open_dev$ndb(0x0, 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x26d) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) 03:49:10 executing program 5: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @random="0aeb000000e6", [], {@ipv6={0x86dd, {0x0, 0x6, "7548a3", 0x3, 0x0, 0x0, @remote, @mcast2, {[], @udp={0x0, 0x0, 0x14, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}, @guehdr={0x1}]}}}}}}, 0x0) 03:49:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1581.889846][ T1244] device bond_slave_1 left promiscuous mode [ 1581.955454][ T1361] device bond_slave_1 entered promiscuous mode [ 1581.980459][ T1361] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1582.011503][ T1406] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:49:10 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='batadv0\x00', 0xc) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000400), 0x4) 03:49:10 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, "f3da92989018f5bd95a52b6ce96ce0e18c64a060fb1579d419751cbc73f4fe2a9b8374c71aea451bb263fb5e7be8d0cde28b17b69f78a4bbfecef6de41bbb96a222c49c870d55f609c42295d183e57db"}, 0xd8) 03:49:10 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x14, 0x1, 0x1, 0xfffffffffffffffd}, 0x14}}, 0x0) 03:49:10 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0eD'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:10 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:10 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000500)=ANY=[@ANYBLOB="23024089d3f495ffcf5a9abfbe726ff1a83dd858d254008000000000000001c59d0d97711f70de867bc78c345d9b750d3dc268a1e10cd0109e7a3731d57d999c7089787b744edc5bef94ba60e841f95ef82bfbeb9bd54a770bae273f175055f39c05bb2ec794f96ea6ac69cdb9f22a0c33612b674217a52b411cf3c971b24c32f7208740b452c57af42ed5276700451f9f5f9f7301eee236066055727b3448f7c43758cf9725352da96697fad646eaff8be47e68ced624ccc39405cdab28e1442bc7d5f7e35d8fb4fe581991b5770b52a13cb150cfa31e662c3f58574d80dc25c9716fbfaff6fd705ad79e1df4fccad77f945279e61cb348c58252fad4c4ba8b2e30e9d617051641284598512559032e4bbcc81e17e8744e6369e19872d663f29a273652617d9110191fb4734f8f91c3309700"/320], 0x10c) prctl$PR_SET_PTRACER(0x59616d61, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) close(r4) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r5, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r5, &(0x7f0000000240), 0xfffffffffffffdfa, 0x0, 0x0, 0xfffffeea) shutdown(r5, 0x400000000000001) dup(0xffffffffffffffff) 03:49:10 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc, 0x42}, 0x3c) r1 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000580), &(0x7f00000002c0)}, 0x20) [ 1582.397551][ T1614] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1582.430652][ T1612] bond0: (slave bond_slave_1): Releasing backup interface [ 1582.451144][ T1612] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1582.566576][ T1612] device bond_slave_1 left promiscuous mode [ 1582.613317][ T1615] device bond_slave_1 entered promiscuous mode [ 1582.628943][ T1615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:11 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2000000}]}, 0x10) 03:49:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) 03:49:11 executing program 0: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(0x0, 0x0, 0x40) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x1) 03:49:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400070500"/20, @ANYRES32, @ANYBLOB="00000000ffff66710048000229c6090032d0ed64f3c3545aaf02000085a4e4ebb5ef670000000000000000885efd5fda5000fcffffff00000000000000000000000052ea7f19a98f23fd9059a55c8a206d00"], 0x74}}, 0x0) 03:49:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\fH'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1582.788565][ T1727] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1582.817375][ T1729] bond0: (slave bond_slave_1): Releasing backup interface [ 1582.824706][ T1729] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1582.906462][ T1729] device bond_slave_1 left promiscuous mode [ 1582.943561][ T1732] bond0: (slave bond_slave_1): Releasing backup interface 03:49:11 executing program 5: r0 = socket(0xa, 0x802, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000000180)="480000001400197f09004b0101048c590a88ffffff010001000000000028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c", 0x48}], 0x1) 03:49:11 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x10000000000002, 0x200) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x9) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000340), 0x4) lsetxattr$smack_xattr_label(&(0x7f0000000700)='./file0/file0\x00', &(0x7f0000000780)='security.SMACK64IPOUT\x00', &(0x7f0000003400), 0x1, 0x1) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000340)={0x4, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "9f4bb4", "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"}}, 0x110) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x5) write$binfmt_misc(r5, &(0x7f0000000240)=ANY=[@ANYBLOB="5300000044a6aeabec2e1520000000000000001000fff64000000000000000003b08d403ffff633b27e59aa144175dd106736d24c3f2c876d699010000000204000000000000c7ec5780fa9dcf6af90dbbede53b853b807511e7330a87bc16598d5db90a452c600301b9f01c936f71358edec3ff8897ad63aa1053f654d9e22e58486f69cb120f937b1a0c6b6bd76a7ba7be961b48aa9fb6c473bc3dbe600f69d42922f3622feee9a2bf28223dd77d120a25137bf9c03f1fc6bcedf7a546dff434c9a40ee88890b54d46647d2373"], 0x58) sendmsg$nl_route(r5, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000400)={&(0x7f00000004c0)=ANY=[@ANYBLOB="2800008f159db3002000200029bd7000ffdbdf2502001245859df2ad"], 0x28}, 0x1, 0x0, 0x0, 0x40}, 0xec586ad5a4d5db69) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_REJECT(r6, &(0x7f0000000340)={0x4, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "9f4bb4", "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"}}, 0x110) sendmmsg(r0, &(0x7f00000032c0)=[{{&(0x7f0000000180)=@sco={0x1f, {0x0, 0x9, 0x0, 0x3, 0x5, 0x8b}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000600)="c65c3bbb94f61fff623e03e62f92008b7be05d72f829193f5da9b2d1c8b4b5c21a8b390eda6f6342137f2ae009807e9b995d0728f7de5de4e4272f135d4a0f9d7a0737b0d4372ded07a396a8c6453899a64f69dd194ef6ba9d", 0x59}, {&(0x7f00000044c0)="0d429be327e4c7a0c491551f61ebcf6446c2b37eeeed4964dc2d72273db5b2cd34958936dfea73e2c239194614eb531153e8f583b76cc6a5a17a62d6717af78b6ef4e70286378d1a06fa551d41bc6f381c8d253a56a1095b38e21ae514a69779f0155e91b002e8ab48e32a3c20c717a3be46cec8c48541c3f2953dd19cd0258aec1b60ea9f2543a6d27dcf5c40853ee8a294f3566c54e1e14ee0c237c753ca83a5c7762a7897f4c197fa62b01df70e0ee9719d9a66bc985f58d716bf1874e616a02344be2d4f3f17b5d8fabdac0a2ca26dfcd4745bac38a8ee7048311a73c5347bc938a52532f2b14349793fa776dcdc4c6e8f3f468e897879349287e17b25c16184e61cad3c5408f5434fcf5671905d9246d42f9d0f59bbee30d46a1fa1716d262d6a94ac964afcf6df6796ae2987448db8cba399bb9be213eb1caf3051c73616365f010c0933b779e3b01f4ce127e5386d5d6c16b1ff0c16e7", 0x15a}, {&(0x7f0000003440)="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", 0x1052}], 0x3, &(0x7f00000007c0)=[{0x10, 0x3a, 0xffff0000}, {0xd0, 0x101, 0x10001, "9a831c4f4162d43aa1a7f30a61ba231c74945fb6a4639b25bb4f1fe0ac979d19a5924b1babf791ba83d7b53e484533e2adfb52e36a7345e788effae4aae0eb84a55c9b79be9ce44d3ffc1d840829a45c5dd9b1b1cfd69c5fd7085e0855f06e4ec17145b519e65e913be8393fb0188a8766fa2a85d0e88ee52e7734b868fa5163205055a0e8d83fb35f2e67c0709d8ba14d78bed77075ab22becd702d80482dbe7e9f1e4e907ebeda8dd76a16c8eb69e6c654d159d118102a85281561fb94"}, {0xb0, 0x952b48d648d59524, 0xc81b, "373bae48f137b682daa9b39cf8a8e434c1babe68b24f7ec6e49db5edb601cca60f76f06535490567a6b23086e6553810f39b84d93f8227e87e799ab50b02c923b7a82414afbf7ce3eba5f99f8c8d19f7399366fc43a4fce4ee2729fb95edfd5ad4847687e17315a3a3d1b777deea8d4416bf92beb677a06babb1eb5396459c2b9eb376416cc1011b41d8348224fa725579910016d8cfba364272"}, {0x80, 0xb, 0xffffffff, "933bdce4a02fb7a5dd0e08b6fed7c2008b79815aaa7fc817614c42312b39f0e03b8755e54c9c010903cd3c32a9704ba571827699b92d0cde5ee064db13e424b633e44b4f50307852f37dbbcf215f95f71c3eedb47b64d3322b72f43a7a39d542e2a1c786baa503e819e357cd"}, {0xc0, 0x112, 0x8, "036adb309b50d57660d1bcf98e0d00cc4468ba0ef4972dc00d6057bf5a72b8d90663015f395a852cfb8fe1eaec118b34dcece55e34e58cae3484865f631d0248762f260860a3375a982b8d172fa6ffa63b3be2ac73b36d79b0863727d2811afbced6c1f1c77a5ea49c21d0e6fff2d471ea38369391ae24d556e37f288c85b49672ee2560cc7d32555bfec2333c207007d65c2dea8baacfae2327058627811d20426c10f9248122ec7c9fe4"}, {0x30, 0x103, 0xf, "44487a2529d31265a02ff2732a44bf4af0865d2c3a95046d73fdc501cd10862f"}, {0x20, 0x119, 0x200000c7, "0846cf23adcf8bcc89287b"}], 0x320}}, {{0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000001ac0)="72755f9f6d24fb67dbb8df4d1d038bb7af44c36f51f656aeccc7f3828113dc13b9ed35704a62372446465061d8bac842aec589e83dd5fdba184d8209fa7e2ccf9351eda8270f57f969b20bbc8b67c5b03deb93896d215507e1209517d7fe8b3cc101a88b0ad362abc2708b35d696ea676757e7217f084852c3033598d858de691cf74e194419fb4d0f1c2ca017f5791b142ce00d1e7c0b910d9753b00173ee62dd1d36d7dce9c9158c1a0e4de6520d910f7b4f830cb5a67ded29d8ea6904c962217d", 0xc2}, {&(0x7f0000001bc0)="203a7b2cdf082e50aa7e834bf41297223308694093a42357a793dfd5f6aa9e86ccfa57d9487aafe0bec71d0fe9bab101537eb38882f974bb8439414bb9e37f229048448b04681b8555271c5fde089b7c51c42a1e8195ed55", 0x58}, {&(0x7f0000001c40)="7aafd03cf0aba0d576e3293fc5b23f16039a29bcc52faed4254f4a1e9d0a64398e53360b5ed78e2ac6f6ab626dd59210f34a84d2f376608871bba688785a8824453508d177229cb9da134b080b1278c51203e44a53918d07afab8a6f8da4998d328225", 0x63}, {&(0x7f0000001cc0)="f3d6562ddf6533292d55caedb348a85119c89278d73a95ae2339297483a0679135e4977199b2e95bf91b5e6dff21c3ed74fef279ff6d81cbdfbcc69402afe62ab7eff31d50e14a0d3c23fb4d0a9c29fe20e0b767c1b4a10418f833d12c396aa44d0438175495ead205377bf6c6919d78a16b41117f0d408fe29d73f268e33e8707142576a8594138b68f9d497b16bc43e8a2d633739f8465fd4a7780225116a17a983d8421c5e0c9fe4622c59f579a1ce636dae4572605c77f4f9c327782c8233e9fcc8331ff9ea812ab08b10106962b60b7a6954650f8eb98048652eaf1f6efdd3c405008c48b0312376908a459c7cd", 0xf0}, {&(0x7f0000000b00)="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", 0x138}, {&(0x7f0000000480)="d935e255b1cea27a67", 0x9}, {&(0x7f0000001e80)="505f65604e20f218c3757598e404f53efe61115e0a9bd80c2343d437f6be1482de61c44a03e9493f891745841e0abb2be1a8796c74a8d33ccc6326239473bf7f549338e4cde48f3857e479d547d7c622c6f8ed83d8ea5e64ec312396df6fecbb0eb1cba51f07f7e28eed6742bb1afcbdd63e5e988d668ce63a45940568a3474caa0d5c7e5a", 0x85}, {&(0x7f0000001f40)="dc03395d5b5fda23991fa96d8e8f759b89c7ca39f3c77102cf3aa4af7570ec0c2a8a8951b887bc3e2125adbc2a7fa4962e8d75135e76722a50359383283baabd01504c9b812d49e1f8ed3b799dfa66c8393c5472ab05d2a8d18ee952677e4146ce920ea0cfeddea8d41d9d87cd5448a1a8b546dceb5acdcd343eb1b002f4935055d29190ee6581a684bde0313f0ae7861a725c9f50d4f8138edfab1f9a2d962517c06cd257d7757c439203c862fb1d1a6cc282e9d22243d27f76924b72ab23ca035e009fc4ffb4d1fe62d4c7", 0xcc}], 0x8, &(0x7f00000020c0)=[{0xe0, 0x112, 0x3, "1f39263a6788a7e003ed667e81451f2fae3531a36a7e7704e00408bd535780df9b1f2797d488518691dfb0eb9e7d2ca4d11323feaa9b5b435ecc5d9cfb2c5e5598bd52803997269c905ef59aaa0080481f328f4779f63ef71c80792ef5c80c47312cb1cf62e9ad3a875542e4c7f840c11d517ca95aeef1312ffcd751557c49ed5b179160e54d22339ba1f11cb728aadfaa71494a2924f9dba9e90dea52687bdd36bff8e62e7a049f997703740260fb56a5ef2649bc1199495fc6b72a25d3ff545ac14d64861e943c9c2a"}, {0x1010, 0x116, 0x6, "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"}, {0xfffffffffffffd20, 0x10d, 0x8, "9c88449c1b9182d2ebad5d36eb7ae93aef5e3f2898acd2ae36460deeb4524f826f7d1f990b89acda1bb86fc0c618447feb891ebbd4a5610072612db8a4c19235807df2fed59a3085bea91621b26cf8689f5f71095760cc480330f617d2691be27ff4cb06c781765d5672f19528785d36fc7b2fa48161f9556877fd31c1373f52699b384cb39ea5dc8b9e2ffd49d6f13f5f5475b9e426ebdafa4daa0f099a6c7976b22238bacb96eab3dc245a5777d1ab6f9a65dd43bf357cd86747f9812b7a9d36a0eec23af5d2fd"}], 0x11c8}}], 0x2, 0x841) ioctl$SNDRV_PCM_IOCTL_DRAIN(r6, 0x4144, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000000c0)=0x1) ioctl$int_in(0xffffffffffffffff, 0x800000c0045009, &(0x7f0000000040)=0x8) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/seq\x0e\x0e\x00\x00\b\x00', 0x10000, 0x0) sync_file_range(r7, 0x40, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0x1f, 0x2, 0x1000, 0x7, 0x7}) r8 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x2, 0x0, 0xfffffdac) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r8, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000340)=""/255) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x8642957429963afb, @perf_bp={0x0, 0x8}, 0x10080, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x82, 0x0) write$RDMA_USER_CM_CMD_REJECT(r9, &(0x7f0000000340)={0x4, 0x108, 0xfa00, {0xffffffffffffffff, 0x0, "9f4bb4", "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"}}, 0x110) ioctl$KVM_GET_CPUID2(r9, 0xc008ae91, &(0x7f0000003340)={0x2, 0x0, [{}, {}]}) ioctl$KVM_RUN(r8, 0xae80, 0x0) clone(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)="18f60a2111586ff65f2573aab50febd1d64fbb4158f63355602481443fece7a1f642d7754be2dbbcd0a5afdcf5e5f5fa7bac7fa790a735e74bb290d2ccdd91d9eacb6ed623261827e03be7b7622d9dabee3c4c88") 03:49:11 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f0000000180)=@vsock={0x28, 0x0, 0x0, @host}, 0x80) 03:49:11 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) semop(0x0, &(0x7f0000000240)=[{0x2, 0x300}, {0xeeab2021a3c14288}, {0x3, 0x0, 0x1000}, {0x3, 0xffff}, {0x2, 0x401, 0x1000}, {0x0, 0x101, 0x1800}], 0x6) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x30}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_virtio(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0x2) [ 1583.303282][ T1738] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1583.338235][ T1741] device bond_slave_1 entered promiscuous mode [ 1583.344747][ T1741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:11 executing program 2: syz_open_dev$dri(0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x2000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) mount(&(0x7f0000000000)=@filename='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='nfsd\x00', 0x0, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) pipe(0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1583.566792][ T1978] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:11 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x3000000}]}, 0x10) 03:49:11 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\fL'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:11 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) mount$9p_virtio(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0x2) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) 03:49:11 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6(0xa, 0x1000080002, 0x0) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text64={0x40, &(0x7f0000000140)="b9640800000f32b9120000000f32b9800000c00f3235004000000f30470f00d6f20f38f0fac74424007c000000c744240204000000ff2c24460f0866b808008ee064420f0118360f017907", 0xdc}], 0xaaaaaaaaaaaaafe, 0x0, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:49:12 executing program 0: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$apparmor_exec(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="5c4342ec0eb706439b4d091d744703c316b19b644679ea550e335c43369b6d77485fcbaac7a610269b4109696d9b6cd231d2bedd2dfccd0ea676f7e789ecbfc895b337f010cdd9af3beccc549ee0ba7733c44b0b0ecadba5e691dc8d33f8ec2fa455870267066b9f575b2e63b1d479d4ca3d0cd8515bac62a366349e6c9087385b00d9dfa7b1d8041aa6a417a62805746c17ef1b55fb44ec88d4a026db957770fb015b8cc428bb29f3a91b0974d35711741fa46efd3a90247bc516a59688c738c067b9bebd31117d8d27152bfe91ed1eeb5dfa9d53e6129f0dc881cad90cfdc82fb939aa1a0d92aeb6d2b8b70c5bd879c64fcf45b4e6161f541e9b9c0c8ded3196228398b15360c727c2bfb766642f3400a724bf056cb809d006ae080994684f86246409924d25fd29306d365a05aea70d4d0870a6519b0f4a9733fe0512f3d43936f91a4d36b27cc505bce73167e43c26d2d867b6a255ae9a1746a57869e85fa852966499f65f45d08f3ca83430d684d017af5027dc7b089400592b184e5cc91f07f9581235b9d6bf1a345610a65571ce4eeba84db23fdafbb19d94134fabdec0748c2229057e0fb8f3f664beadee22aa9105cb39411a8d269e81cf9e5776548abf6c8a8325ec94fd90ebb3a3a89090dbc258f438d1830575e563d7b77165abaeef2a9e95dea0a434725b5cc43fb7cf6fdbbe52c5bcb334be7df76e2f347dbc2e74941c25cb93ea22416128d64658d808d1104e7be8bc29c81e36ff95a3f384f4a5e866c2401f1f000000ab9a03953e565cc42554944dc76083a1a0c8676ee3feef5bb3bd18521b3dab972403aa84430ed092f43801785744ee61f5b982eabd353a22f6662fa18f2538a81ecfb6a7e11b38063b181ede61d98bfe9bc228c92d0cd411c12a99b61324416fd97c879e7faee8d5cd964f199f35c45a8b081b2003c2c7744258899c5d0f5336b965f723850df2c52cae6362114bb5eb437252a3bd056acf0dca5e136a823f706adc704c9f2e16a6d8cb486a1547d01070fa0376f4d447a3d182bed2f2860d0cab8b97fc1624fa2411bf1cddbea4ba9dcfeb73bfba2fc523b2b9d7c280aacff1bc337fe12928b152c8874b9208f98cd3297dce80f4cd7372a0bef377af76e6770541b8de46d4f8e4b1821204eb13e542eb8e91d655e3cc15903db7646ec8b87f2bba3bad05b02e09c0eb4500c6a223f6a2c13a0aa43ce9429771b0a8a1d365d1c069a60a7e5ece2d2e470182ba75a1406089022d70326813d2b88e8b727ceb5e635020442e276b96a067c607de2af912e8d61b0c184bdb7a85df6f0be2b2215e446dd47a7fee506731703459ab530bf0589cb22f2275d6337556541f50aec016a16f1f7ae86bca019b06fef8f7030f2e06c5b40200588ac6a86b0f2ea45f2f545ef0b153e9825e43a642be58ce26f3df6ee9222dc1bbe3a47dfcc1630214399315dd15b0acd116c0b6296a00d5995875308440be342f8ccb6fdf4c2ff8029adefbc3dab8324482c42547cb11cdfa03df57a55a53c651300b51ea4db9f61a91682fc2f088a4ddb5627b10666d13163922cb66abf19a83f33c6f4db5dfa10a0ba75d175db3c21c0510cc1cceb7481de33e0dc74e4168c728fdf908803c5520b55c37a65fd504e872f2570f3384937f3ef751e7919253c9c2d6b61748ca1431a3a78652b2f83e028c16260d02f873f1da438bd41df4ddbe17f7f2b852318077a9960ac4722890611b1d5960f8a2e372d2e2781a96ed5994f707eae3b37e39dd99f728f3637bb44f3dc5bf2642521b9a87905b18008c4bac0c3591356967e1036b5530473fb9d17069f60bf065a0cd8f107cea63323cd37b2af75964b066484b7bbc720000"], 0x26d) [ 1583.728090][ T2086] bond0: (slave bond_slave_1): Releasing backup interface [ 1583.764857][ T2086] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1583.856584][ T2086] device bond_slave_1 left promiscuous mode 03:49:12 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f00000000c0)="b9800000c00f3235010000000f309a090000006500660f3882af724d00002ed8ddc74424008fc4bd87c7442402c43a727fc7442406000000000f011424f30f090f013a360f06c4c18d72d68366baa100ed", 0x299}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6(0xa, 0x1000080002, 0x0) r5 = dup3(r3, r4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x2}, 0x0, 0x144}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1583.933756][ T2102] bond0: (slave bond_slave_1): Releasing backup interface 03:49:12 executing program 0: socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000003340)=ANY=[@ANYPTR, @ANYBLOB], 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x7, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000040)}, 0x10) 03:49:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0eL'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:12 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280), 0x4) [ 1584.238791][ T2325] device bond_slave_1 entered promiscuous mode 03:49:12 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) semop(0x0, &(0x7f0000000240)=[{0x0, 0x300}, {0xeeab2021a3c14288}, {0x3, 0x0, 0x1000}, {0x3, 0xffff}, {}, {0x0, 0x401, 0x1000}, {0x0, 0x0, 0x1800}], 0x7) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_virtio(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0x2) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) 03:49:12 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280)={0xef, 0x0, 0x4000}, 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r2, &(0x7f0000000580)={0x1f, 0x0, {0x1b, 0x0, 0x80, 0x4, 0x9, 0x1}, 0x1, 0x7}, 0xe) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$packet_int(r3, 0x107, 0xc, &(0x7f00000000c0), 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000400)) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) [ 1584.297350][ T2325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1584.385619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1584.391453][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:49:12 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x4000000}]}, 0x10) 03:49:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\fP'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:13 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) [ 1584.664890][ T2440] bond0: (slave bond_slave_1): Releasing backup interface [ 1584.685755][ T2440] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:13 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000001780)='/dev/video35\x00', 0x2, 0x0) fchown(r0, 0x0, 0xee00) 03:49:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1584.866571][ T2440] device bond_slave_1 left promiscuous mode 03:49:13 executing program 0: r0 = inotify_init() sync_file_range(r0, 0x0, 0x0, 0x0) [ 1584.950248][ T2445] device bond_slave_1 entered promiscuous mode [ 1584.976992][ T2445] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:13 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0eT'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r2, 0x3a, 0x1, 0x0, &(0x7f0000000000)=0x321) 03:49:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1585.344127][ T2585] bond0: (slave bond_slave_1): Releasing backup interface [ 1585.379213][ T2585] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1585.426726][ T2585] device bond_slave_1 left promiscuous mode 03:49:13 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000000}]}, 0x10) 03:49:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000004e667263a7192ff58ab16f88b96674015bff123c793da5668b145e6313f3ee41e2f26f04de687a25340b61976cae3a9a9e90785afd31885d362411ef75cd8fef4aa6dac6acb5ded04e5435e7a3bfcb79eda4bf258d5e649ca8b8d914916ee79d501a3a01000000376bb9f94c01040000158864d444d4bf66e8d85cc74a0000000000000000000000781f159e5b921a5ad4f128e2b90e1d3dd7fe6e38d2d29be9a5adffffff7f000000"], 0x10}}, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 03:49:13 executing program 5: syz_emit_ethernet(0xd6, &(0x7f0000000000)={@dev={[], 0x29}, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xc8, 0x0, 0xca26, 0x0, 0x0, 0x0, @local, @multicast1}, @gre={{}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [], "46d74e19a00a12c74095201af9cba3dd50886bbcabe8a8b33083532cf5d1a033555f1b2a0e1f58c7390d9dce5fa3ac3a"}, {}, {}, {0x8, 0x6558, 0x0, "e3b57882c08bfb8994be50a9bf9121a109697ca0c02bbb707831911ce9edb67ef17a43f54cd01ab218f64b86c6c5c2cbfcc8701b285a3aae74c598c64ddf5288"}}}}}}, 0x0) [ 1585.496094][ T2585] device bond_slave_1 entered promiscuous mode [ 1585.529071][ T2585] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1585.600168][ T2685] bond0: (slave bond_slave_1): Releasing backup interface 03:49:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x60, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 1585.645709][ T2685] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1585.725783][ T2685] device bond_slave_1 left promiscuous mode 03:49:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1585.794671][ T2700] device bond_slave_1 entered promiscuous mode [ 1585.830423][ T2700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\fX'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x60, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 1586.085801][ T2816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1586.114640][ T2818] bond0: (slave bond_slave_1): Releasing backup interface [ 1586.133847][ T2818] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1586.269804][ T2818] device bond_slave_1 left promiscuous mode 03:49:14 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r1 = dup(r0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000140)='cpuset.mem_hardwall\x00', 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) 03:49:14 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280), 0x4) [ 1586.367347][ T2824] bond0: (slave bond_slave_1): Releasing backup interface 03:49:14 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x6000000}]}, 0x10) 03:49:14 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e\\'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:14 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f"]}) [ 1586.550210][ T2826] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) dup(0xffffffffffffffff) [ 1586.677758][ T2935] device bond_slave_1 entered promiscuous mode [ 1586.685254][ T2935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1586.751564][ T2942] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:49:15 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="0f"]}) [ 1586.799018][ T2945] bond0: (slave bond_slave_1): Releasing backup interface 03:49:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f`'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1586.972774][ T2949] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x2}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) dup(0xffffffffffffffff) [ 1587.058174][ T2956] bond0: (slave bond_slave_1): Releasing backup interface [ 1587.080799][ T2956] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:15 executing program 0: socket(0x1, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000300)='./file0\x00') r0 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xffffffffffbffff8) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x16) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.stat\x00', 0x275a, 0x0) fallocate(r3, 0x0, 0x0, 0x110001) 03:49:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1587.176574][ T2956] device bond_slave_1 left promiscuous mode [ 1587.254284][ T2958] device bond_slave_1 entered promiscuous mode [ 1587.299686][ T2958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1587.359331][ T2966] bond0: (slave bond_slave_1): Releasing backup interface 03:49:15 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x7000000}]}, 0x10) 03:49:15 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:15 executing program 0: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$apparmor_exec(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="5c4342ec0eb706439b4d091d744703c316b19b674679ea550e335c43369b6d77485fcbaac7a61026b04109696d9b6cd231d2bedd2dfccd0ea676f7e789ecbfc895b337f010cdd9af3beccc549ee0ba7733c44b0b0ecadba5e691dc8d33f8ec2fa455870267066b9f575b2e63b1d479d4ca3d0cd8515bac62a366349e6c9087385b00d9dfa7b1d8041aa6a417a62805746c17ef1b55fb44ec88d4a026db957770fb015b8cc428bb29f3a91b0974d35711741fa46efd3a90247bc516a59688c738c067b9bebd31117d8d27152bfe91ed1eeb5dfa9d53e6129f0dc881cad90cfdc82fb939aa1a0d92aeb6d2b8b70c5bd879c64fcf45b4e6161f541e9b9c0c8ded3196228398b15360c727c2bfb766642f3400a724bf056cb809d006ae080994684f86246409924d25fd29306d365a05aea70d4d0870a6519b0f4a9733fe0512f3d43936f91a4d36b27cc505bce73167e43c26d2d867b6a255ae9a1746a57869e85fa852966499f65f45d08f3ca83430d684d017af5027dc7b089400592b184e5cc91f07f9581235b9d6bf1a345610a65571ce4eeba84db23fdafbb19d94134fabdec0748c2229057e0fb8f3f664beadee22aa9105cb39411a8d269e81cf9e5776548abf6c8a8325ec94fd90ebb3a3a89090dbc258f438d1830575e563d7b77165abaeef2a9e95dea0a434725b5cc43fb7cf6fdbbe52c5bcb334be7df76e2f347dbc2e74941c25cb93ea22416128d64658d808d1104e7be8bc29c81e36ff95a3f384f4a5e866c2401f1f000000ab9a03953e565cc42554944dc76083a1a0c8676ee3feef5bb3bd18521b3dab972403aa84430ed092f43801785744ee61f5b982eabd353a22f6662fa18f2538a81ecfb6a7e11b38063b181ede61d98bfe9bc228c92d0cd411c12a99b61324416fd97c879e7faee8d5cd964f199f35c45a8b081b2003c2c7744258899c5d0f5336b965f723850df2c52cae6362114bb5eb437252a3bd056acf0dca5e136a823f706adc704c9f2e16a6d8cb486a1547d01070fa0376f4d447a3d182bed2f2860d0cab8b97fc1624fa2411bf1cddbea4ba9dcfeb73bfba2fc523b2b9d7c280aacff1bc337fe12928b152c8874b9208f98cd3297dce80f4cd7372a0bef377af76e6770541b8de46d4f8e4b1821204eb13e542eb8e91d655e3cc15903db7646ec8b87f2bba3bad05b02e09c0eb4500c6a223f6a2c13a0aa43ce9429771b0a8a1d365d1c069a60a7e5ece2d2e470182ba75a1406089022d70326813d2b88e8b727ceb5e635020442e276b96a067c607de2af912e8d61b0c184bdb7a85df6f0be2b2215e446dd47a7fee506731703459ab530bf0589cb22f2275d6337556541f50aec016a16f1f7ae86bca019b06fef8f7030f2e06c5b40200588ac6a86b0f2ea45f2f545ef0b153e9825e43a642be58ce26f3df6ee9222dc1bbe3a47dfcc1630214399315dd15b0acd116c0b6296a00d5995875308440be342f8ccb6fdf4c2ff8029adefbc3dab8324482c42547cb11cdfa03df57a55a53c651300b51ea4db9f61a91682fc2f088a4ddb5627b10666d13163922cb66abf19a83f33c6f4db5dfa10a0ba75d175db3c21c0510cc1cceb7481de33e0dc74e4168c728fdf908803c5520b55c37a65fd504e872f2570f3384937f3ef751e7919253c9c2d6b61748ca1431a3a78652b2f83e028c16260d02f873f1da438bd41df4ddbe17f7f2b852318077a9960ac4722890611b1d5960f8a2e372d2e2781a96ed5994f707eae3b37e39dd99f728f3637bb44f3dc5bf2642521b9a87905b18008c4bac0c3591356967e1036b5530473fb9d17069f60bf065a0cd8f107cea63323cd37b2af75964b066484b7bbc720000"], 0x26d) 03:49:15 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\fd'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000003007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3f7fffffff2f73451c0e17a606fe530cb7e18ad181867514fe60077d4dd90123d27e7cf43548ce85857ad4a77cb56e07dfbdfd4e7540ebec677d6ac14c2c794f72cbf5fe31789e7023bbf6087bc5eae5c34a953f8dbe82e16cf000000000000000033850ae2fd45d54b107c8c247f195e32f17799d6707432ff48bc085763314166443ee72c74f3db890e1ff15a10d91f67e9a22a986e0e9db7e632df572344b419c45c2170fe8792d825511ec16822bdffd313660489c4c953a548ea5480dae93c7e5520a050f7c4cad3d9e75762e06f2954a18bd8464853b36a696e6ee7f2a12b53d086635cd6e8da81db76010000008da56e49b095a052811a0aac9f7c8b4afd65e9351ca78586e9681379f1ede100000000001986978e87a7e61f65163cf8fbfc1ed498c583751798a90dd7be57d0a09478983a2cb5dd52df5e33789054354c6375f343f73d6e00f28a24f649bc5c9de7aa3ed9ce87cee046edc1e8161a8bd4683241577aaa424195e6c693f50a045e1516795b28bb315561ec5d3906806032d78a97b3257d81d32c419a2f0262e5e1ce5c0494a9f8cb7419862fd5c4dd9c4564fca1b058109e2f976c32246387630525877338b90600000000000004016d417ab821c017a6aad783b27f1a5cdc06367a6fe84122a0d48f1ddcbc200000000080000000cd5fc3cc7bce826b9e5b6954b2e4919690655f0432ab9be03b698b84d9dd20a6cee2c291ab432ebb6f008161130e5c2f1cd517e0e7c516142ffa4f4957aa9b94ab1b79b769b710dc279aa634d864c9776d0927f2eb0923ffcde861d4e29f2a8784815a8add3bb6eeee7612dcbb74ed558289d3688dcec3d7339052bf2e70beef41cef818ab85379b8cb7329e2b04938798338c9b732dd1a4f848e5abf5f63f8cd46b2887eed66f236c196cf28a35a3628aa3f0221749ec18a9269f90fb77af89619d7d6e737445463229fe935ab3c724f0de526d7750ce99be7857ed55acc5f4fbba2513fb9144135c2c472c16a400000000c8481963ece5efccb3f793057a0fe8aeea045c6376e8ad3ad74a3fcf628507799477e0a151ccb2d4aaffba3600be4b35d7659065ea3146c913abee418f1c2b3002f648f1d6c362f47e91bd6e610a161f663ab4e88798a204cc816b844325f662f9f22c019d777699d6775cb711e7260ad8b4ee9176b1bb4d3dacdf3d7b79fcb7ce2379ade1c270903373e33b5869b7d7e9fcfdf0ce76d6a8a633ab8f476a916f603fff9f0c558fd88919bcf7a2afb00ac377fd26fd3e5dd822bf36eaf03329c05f10ce4118f399834b39eec68b8c8296877036ae0ac0fa9f5a8ecd4a71cdb3af51b903ef0da4f4c4216f2cf495bb4dce881ed8e4193468ae88881fe753b8ca6c8f4b6e029e1c2dc4f7bc45bf47ab48afac8377dc67c63655e5436a243bb1ae446c730ef215c727f3c97892bd4d39b5617ffe02bb01111f701da65ff7333d3b0760969e553b48b16ce54f260a54fe45950f786f6f34e77688a5e7d30e4222e8b1fd96e060de3bb7687a0000000000000000000000f1cbfe446472aa999418a8ac7629f553ef7fc0373c9a39dbc91d8571b76cb06bd45b80e961a690de1d31d619a5697d82f85a56e3bfcd185b028587fa1814c03726963b54f703e1655c4355cae0cf6efd7e90b2956020b1a97944c5cf9fe5e63f44b7e2337d3f8039d2e3c0035abc0b1568c307d5ae9056fe0f5d71d3098964d2ff141d3489e2f34dda5f9342d1343c2d865268e38a6dd0ddaa5e26c455d00a76f9cff7b71b5b0e44dd2afd07378c30798c592b37449c8088b40cc120e4117e3088efab73262b0e9af7738a6b2907f64f271d908b2a3bcf4c59585782af6ad913c8d47e25af7008a7061801853ea2292103a66735faab43cf5940616f"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r0, 0x1800000000000060, 0xe, 0x60, &(0x7f0000000100)="0000003f0000007e5bc5795ecaa2", 0x0, 0x100, 0xf2ffffff}, 0x28) [ 1587.741899][ T2971] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1587.822903][ T3129] bond0: (slave bond_slave_1): Releasing backup interface 03:49:16 executing program 0: write(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x80, 0x30b000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000440)=0x100) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="02", 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x336, &(0x7f0000000300)={&(0x7f0000000700)={'crc32c-generic\x00\x000\x16\xc7\xec\x91\x05\x0e\xbb\x7f\x11\x97\xa9\x1a\xb4\x00'}}) r3 = request_key(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='cpuset)*{\x00', 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000240)={r2, r3}, &(0x7f00000003c0)=""/30, 0x1e, &(0x7f0000000440)={&(0x7f0000000400)={'nhpoly1305-sse2\x00'}, &(0x7f0000000580)="aa826a1933cfcf2198fa85fa8d1dd8e6f15e1a848e0a264ddc5802ed7f1aa2179370edc6cd046d5707bcb43004625524093b818df2119c814c037f18f97da7d05508fcca03874be6d17b9bf0e720aeb1d2d01c852b73861ad3e43f5075269548b17ab085a3d19b29b25a79af687d114d101b9f5982402e13f676fbca7f0dc2f65bd8378a73de21c36ea42c67591d10cea6bb84a431271cb18a5a9a35e21e78e3c2aee0586762988d9617affcf93c5530024910ca812903499867e5e0c10d998171", 0xc1}) add_key$keyring(0x0, &(0x7f0000000180)={'\x00', 0x0}, 0x0, 0x0, r3) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) socketpair(0x8, 0x2, 0x9, &(0x7f00000001c0)) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="2e00000023008165e45ae08700000000060f0ec0000000bc4cc91b4dd65b2f0580cb7023f52a556d1cd4f1cbf90a", 0x2e}], 0x1}, 0x0) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x0, 0x1afb71cf76b1da8f) r5 = socket(0x40000000002, 0x3, 0x80000000002) r6 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000010000500d25a80648c63940d0300fc00100002400200a06d053582c137153e370900018000f01700d1bd", 0x2e}], 0x1}, 0x0) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) sendto$llc(r7, &(0x7f0000000000)="fad911553dea9381c2660568e36bbf30e2100d04ffc7e310615fa16b12b389841d63abf100aeeb9f", 0x28, 0x20000040, &(0x7f0000000040)={0x1a, 0x100, 0x6, 0x0, 0x8, 0x7, @remote}, 0x10) dup2(r5, r7) 03:49:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1587.883011][ T3129] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:16 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000000)={0x0, 0xddbd}) 03:49:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1588.006294][ T3129] device bond_slave_1 left promiscuous mode 03:49:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0ed'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:16 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x121015c66e96e920, 0x0) [ 1588.123578][ T3326] bond0: (slave bond_slave_1): Releasing backup interface 03:49:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1588.376692][ T3365] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:16 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x8000000}]}, 0x10) 03:49:16 executing program 0: timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0xcc, 0x80, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0xb) dup3(r0, 0xffffffffffffffff, 0x80000) pause() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 03:49:16 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) getpid() openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) gettid() write$apparmor_exec(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x26d) 03:49:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:16 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:16 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\tl'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1588.629843][ T3382] bond0: (slave bond_slave_1): Releasing backup interface 03:49:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:17 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) getpid() openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) gettid() write$apparmor_exec(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x26d) 03:49:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1588.949839][ T3393] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=@newlink={0xa8, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_XDP={0x80, 0x2b, [@IFLA_XDP_FD={0x7c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}}]}, @IFLA_GROUP={0x8}]}, 0xa8}}, 0x0) 03:49:17 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r3, 0x0, 0x32, &(0x7f00000000c0)=0x2000000, 0x4) 03:49:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1589.200301][ T3623] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1589.290930][ T3623] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1589.369510][ T3728] bond0: (slave bond_slave_1): Releasing backup interface 03:49:17 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xc000000}]}, 0x10) 03:49:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:17 executing program 0: socket$alg(0x26, 0x5, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video2\x00', 0x2, 0x0) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001b80)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000028c0)="b7f2288a933d66593ae164c990a0028e", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0x35a3aad1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 03:49:17 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0el'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1589.614745][ T3734] device bond_slave_1 entered promiscuous mode [ 1589.626944][ T3734] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1589.671922][ T3742] bond0: (slave bond_slave_1): Releasing backup interface 03:49:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x19b) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000001c0)=0x2, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @empty}, 0x1c) sendto$inet6(r0, &(0x7f0000000040)='\t', 0x1, 0x0, 0x0, 0x0) recvfrom$inet6(r0, 0x0, 0x2, 0x22, 0x0, 0x0) [ 1589.730242][ T3742] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) close(r0) 03:49:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:18 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x30, 0x0, 0x0, 0xfffff030}, {0x6}]}, 0x10) [ 1589.886167][ T3742] device bond_slave_1 left promiscuous mode 03:49:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\ft'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1590.041230][ T3858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:18 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@dev, 0x2000, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5}}, 0xe8) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) [ 1590.148395][ T3967] device bond_slave_1 entered promiscuous mode [ 1590.165025][ T3967] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:18 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x10000000}]}, 0x10) 03:49:18 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000a40)) 03:49:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:18 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0et'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:49:18 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) [ 1590.480690][ T3980] bond0: (slave bond_slave_1): Releasing backup interface 03:49:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:49:19 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) semop(0x0, &(0x7f0000000240)=[{0x2, 0x300}, {0xeeab2021a3c14288, 0xfffe}, {0x3, 0x0, 0x1000}, {}, {0x2, 0x401, 0x1000}, {0x0, 0x101, 0x1800}], 0x6) getpid() ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000140), 0x8}, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) mount$9p_virtio(0x0, 0x0, &(0x7f00000000c0)='9p\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) creat(&(0x7f00000000c0)='./bus/file1\x00', 0x0) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f00000001c0)=0x2) [ 1590.822607][ T3981] bond0: (slave bond_slave_1): Releasing backup interface [ 1590.845757][ T3981] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:49:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1590.966603][ T3981] device bond_slave_1 left promiscuous mode 03:49:19 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x0, 0x4000}, 0x4) 03:49:19 executing program 5: write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000300)={0xc, 0x1000, "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"}, 0x1006) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f, 0x0, 0x0, 0x0, @local}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={&(0x7f0000000200), 0x10, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) r1 = gettid() r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x16) [ 1591.120945][ T4114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1591.265623][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1591.271442][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:49:19 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x14000000}]}, 0x10) 03:49:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\f|'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:19 executing program 0: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$P9_RXATTRCREATE(r0, &(0x7f00000000c0)={0xfffffe1d}, 0xfe3e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r3, 0x0, 0xd028, 0x816d1) write$P9_RFLUSH(r3, &(0x7f0000000100)={0x7}, 0x7) write$P9_RFLUSH(r0, &(0x7f0000000180)={0x7}, 0xffffff38) fsync(r3) [ 1591.549652][ T4228] device bond_slave_1 entered promiscuous mode [ 1591.573098][ T4228] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:19 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1591.602092][ T4230] bond0: (slave bond_slave_1): Releasing backup interface 03:49:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @link_local}, 0x14) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8475071") sendto$inet6(r0, &(0x7f0000000280)="0503002c8906480001000200c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0x1005a, 0x800, 0x0, 0x2f) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/168, 0xa8}], 0x1) [ 1591.936295][ T4236] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 1592.001697][ T4115] cgroup: fork rejected by pids controller in /syz5 03:49:20 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e|'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:20 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x7, 0x7, 0x9}, 0x3c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x4, 0x4, 0x1, 0x0, r0}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r1, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 03:49:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1592.234437][ T4447] bond0: (slave bond_slave_1): Releasing backup interface [ 1592.282945][ T4447] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:20 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x15000000}]}, 0x10) 03:49:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000002) pipe(&(0x7f00000026c0)) msgget$private(0x0, 0x1c0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000026ff8)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000300)="6b4846af99fcd247df65888781566159b45a5677a5f5e2f55c28aad857ed5a3dd35da72b9bdc52abd5d94b343b4b21e258cf274fab0861fbe62998272e822365b898fb24019f6b8adb76ff90fb489ecaf73440aa321e59cdbac254e8c5f1488f18b5e8a68ab230f975158278ee86d99c34690f66751e8a8d71c70d3c5b11dfa4091eccf6606286f8ff", 0x89, 0x0, 0x0, 0x0) flock(r0, 0x2) r1 = socket(0x18, 0x1, 0x0) getsockopt(r1, 0x200000029, 0x25, 0x0, 0x0) fcntl$getown(r1, 0x5) r2 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r2, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0], 0x1, 0x7fc) msgsnd(r2, &(0x7f0000000040)=ANY=[@ANYRES64], 0x1, 0x800) msgsnd(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x1, 0x7fb) msgrcv(r2, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x1, 0x0, 0x1004) msgrcv(r2, &(0x7f00000000c0)={0x0, ""/147}, 0x9b, 0xd6d0c418f59fe7d3, 0x1000) msgsnd(r2, &(0x7f0000001e00)=ANY=[@ANYPTR=&(0x7f0000001ec0)=ANY=[@ANYRESHEX, @ANYRESDEC]], 0x1, 0x800) [ 1592.396301][ T4447] device bond_slave_1 left promiscuous mode 03:49:20 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000440)='/dev/rtc0\x00', 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) getdents(r2, 0x0, 0x0) 03:49:20 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 1592.493404][ T4553] device bond_slave_1 entered promiscuous mode 03:49:20 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1592.552417][ T4553] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:20 executing program 0: socket(0x0, 0x0, 0x0) setsockopt$netrom_NETROM_N2(0xffffffffffffffff, 0x103, 0x3, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) socket$inet6(0x10, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000005b40)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="2e0000001e000500ed0080648c6394f27e31d20004000b404b48000001000080000000000300f88000f01700d0bd", 0x2e}], 0x1}, 0x0) socket(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) connect$rxrpc(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00), 0x0, 0x0) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000009380)) bind(0xffffffffffffffff, 0x0, 0x0) 03:49:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:49:21 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0xfffffffefffffff2, &(0x7f0000000080)) [ 1592.751410][ T4674] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e\x84'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1592.798959][ T4676] netlink: 22 bytes leftover after parsing attributes in process `syz-executor.0'. 03:49:21 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2, 0x8}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) r1 = getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84f6f96cdc1ea4c5, 0x0) clock_adjtime(0x3, &(0x7f0000000500)={0x1, 0x2000000, 0x5, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x6, 0x80000001, 0xa3f5, 0x8001, 0x0, 0x7, 0x5, 0x6, 0x7ff}) ioctl$VFIO_IOMMU_MAP_DMA(r4, 0x3b71, 0x0) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r1, 0x388, 0x0) bind$netlink(r0, &(0x7f00000004c0)={0x10, 0x0, 0x25df5bfb, 0x11000080}, 0xc) 03:49:21 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:49:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1592.869895][ T4676] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1592.902057][ T4685] bond0: (slave bond_slave_1): Releasing backup interface [ 1592.969235][ T4685] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1593.086535][ T4685] device bond_slave_1 left promiscuous mode [ 1593.125009][ T4709] bond0: (slave bond_slave_1): Releasing backup interface 03:49:21 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x16000000}]}, 0x10) 03:49:21 executing program 0: 03:49:21 executing program 5: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x2, 0x8}}, 0x20) perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x10, 0x80002, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040), 0x4) r1 = getpid() r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r2, 0x16, &(0x7f0000000100)) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x84f6f96cdc1ea4c5, 0x0) clock_adjtime(0x3, &(0x7f0000000500)={0x1, 0x2000000, 0x5, 0xffffffff, 0x60cf, 0x9, 0xffffffffffffffff, 0x0, 0x200, 0x5, 0x100000001, 0x0, 0x3, 0x8001, 0x6, 0x1000, 0xfffffffffffffffe, 0x6, 0x80000001, 0xa3f5, 0x8001, 0x0, 0x7, 0x5, 0x6, 0x7ff}) ioctl$VFIO_IOMMU_MAP_DMA(r4, 0x3b71, 0x0) ptrace(0x10, r2) ptrace$pokeuser(0x6, r2, 0x388, 0xb8) ptrace$pokeuser(0x6, r1, 0x388, 0x0) bind$netlink(r0, &(0x7f00000004c0)={0x10, 0x0, 0x25df5bfb, 0x11000080}, 0xc) 03:49:21 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:49:21 executing program 0: 03:49:21 executing program 5: 03:49:21 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:49:21 executing program 0: 03:49:21 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\v\x88'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:21 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:49:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:22 executing program 5: waitid(0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) [ 1593.758638][ T4814] device bond_slave_1 entered promiscuous mode [ 1593.778201][ T4814] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1593.837612][ T4816] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:22 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1c000000}]}, 0x10) 03:49:22 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b00)={0xa, 0x1d, 0x400, 0xc}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000700), &(0x7f00000002c0)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000280), &(0x7f0000000300), 0x1}, 0x20) 03:49:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:22 executing program 5: 03:49:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e\x8c'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:22 executing program 5: [ 1594.242453][ T4825] bond0: (slave bond_slave_1): Releasing backup interface [ 1594.267298][ T4825] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:22 executing program 0: [ 1594.346462][ T4825] device bond_slave_1 left promiscuous mode [ 1594.386451][ T4829] bond0: (slave bond_slave_1): Releasing backup interface 03:49:22 executing program 5: 03:49:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:22 executing program 0: 03:49:23 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x1d000000}]}, 0x10) 03:49:23 executing program 5: 03:49:23 executing program 0: 03:49:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:49:23 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f90487055e677e552c407095032acfb13f997c3b7aef47b5ede0985b71c577a49f5fd8d4a26645adb8224ee4400c5f921361ca125eecce3c1f6fc51d33558bfb470641e7fb35ee2b0da473a89f7e1303626b28bba72d1bad3f8251bdfa915d961a962109f095fd395bb7da2a3d293b3753fdd77276008be9b6fd60d9bc3425b8406292ade18c97b42f3661e790890d6d55b05a225f1f3f7b909ee0cf3d143bc608a246f4ba016149424d8ca7053c3700560bbaaf4eb6e1a89cc4bf090e8437a1a3c459ac21bfbb074230b39a2da7d86bc65da5243a47dd216b48cc32593074dc64adfe5497ce054ca71eb7aa0030e1a31b121a0601b230a9f8c800061e287acbee6df5ea17724597038ed911690bdfb2cc5e85f4ab7a4834d9424a1264a582766694d9e6a0754021854fcce69e0de857de236fc48cc6f643017ee195c89ba52f01977133dda76610c0d06a7c9460ebfb7c12476ee733665dab4db52d1830210b"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x0e\x94'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:23 executing program 5: [ 1595.045772][ T4947] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1595.083908][ T4953] device bond_slave_1 entered promiscuous mode 03:49:23 executing program 0: 03:49:23 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 1595.102372][ T4953] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 03:49:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() [ 1595.180814][ T4959] bond0: (slave bond_slave_1): Releasing backup interface 03:49:23 executing program 5: [ 1595.215921][ T4959] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts 03:49:23 executing program 5: [ 1595.289063][ T4959] device bond_slave_1 left promiscuous mode [ 1595.334494][ T4966] bond0: (slave bond_slave_1): Releasing backup interface 03:49:24 executing program 1: r0 = memfd_create(&(0x7f0000000100)='H\x7f\xc4\x00\x00\x00\x00', 0x0) write$eventfd(r0, &(0x7f0000000080)=0x20000000000084, 0x8) write(r0, &(0x7f0000000040)="0600", 0x2) sendfile(r0, r0, &(0x7f00000000c0), 0xfeff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1b0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x20000000}]}, 0x10) 03:49:24 executing program 0: 03:49:24 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, &(0x7f0000000280)=[@text32={0x20, &(0x7f0000000200)="0f3235010000000f309a090000006500660f3882af724d00002e51be127cdd0e6466660f2b9d08000000c7442406000000000f011424f30f090f013a360f06f336f010627166baa100ed", 0x154}], 0x1, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:49:24 executing program 5: 03:49:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\v\xc0'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) 03:49:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:24 executing program 5: 03:49:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000032000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0xffffffffffffff11) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:49:24 executing program 0: [ 1595.837547][ T4976] device bond_slave_1 entered promiscuous mode [ 1595.860206][ T4976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1595.910073][ T4979] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 03:49:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\nl!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) getpid() 03:49:24 executing program 5: 03:49:24 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x240040, 0x0) unshare(0x2040400) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0x10, 0x0, 0x0) ioctl$sock_ifreq(r0, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\b\xc8'}) getpid() bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) [ 1596.124542][ T4990] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1596.197648][ T4994] bond0: (slave bond_slave_1): Releasing backup interface [ 1596.224090][ T4994] bond0: (slave bond_slave_1): the permanent HWaddr of slave - 46:23:29:85:4b:2c - is still in use by bond - set the HWaddr of slave to a different address to avoid conflicts [ 1596.306951][ T4994] device bond_slave_1 left promiscuous mode [ 1596.333599][ T4995] device bond_slave_1 entered promiscuous mode [ 1596.363496][ T4995] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1596.420325][ T4978] ================================================================== [ 1596.428456][ T4978] BUG: KCSAN: data-race in ksys_write / ksys_write [ 1596.434964][ T4978] [ 1596.437293][ T4978] write to 0xffff88807d9a8a68 of 8 bytes by task 4982 on cpu 1: [ 1596.444918][ T4978] ksys_write+0x101/0x1b0 [ 1596.449248][ T4978] __x64_sys_write+0x4c/0x60 [ 1596.453831][ T4978] do_syscall_64+0xcc/0x370 [ 1596.458328][ T4978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1596.464204][ T4978] [ 1596.466535][ T4978] write to 0xffff88807d9a8a68 of 8 bytes by task 4978 on cpu 0: [ 1596.474172][ T4978] ksys_write+0x101/0x1b0 [ 1596.478507][ T4978] __x64_sys_write+0x4c/0x60 [ 1596.483095][ T4978] do_syscall_64+0xcc/0x370 [ 1596.487594][ T4978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1596.493555][ T4978] [ 1596.495872][ T4978] Reported by Kernel Concurrency Sanitizer on: [ 1596.502017][ T4978] CPU: 0 PID: 4978 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 1596.510245][ T4978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1596.520305][ T4978] ================================================================== [ 1596.528364][ T4978] Kernel panic - not syncing: panic_on_warn set ... [ 1596.534948][ T4978] CPU: 0 PID: 4978 Comm: syz-executor.1 Not tainted 5.4.0-syzkaller #0 [ 1596.543172][ T4978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1596.553328][ T4978] Call Trace: [ 1596.556632][ T4978] dump_stack+0x11d/0x181 [ 1596.560967][ T4978] panic+0x210/0x640 [ 1596.564864][ T4978] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1596.571112][ T4978] ? vprintk_func+0x8d/0x140 [ 1596.575702][ T4978] kcsan_report.cold+0xc/0xd [ 1596.580310][ T4978] kcsan_setup_watchpoint+0x3fe/0x460 [ 1596.585697][ T4978] __tsan_unaligned_write8+0xc4/0x100 [ 1596.591070][ T4978] ksys_write+0x101/0x1b0 [ 1596.595408][ T4978] __x64_sys_write+0x4c/0x60 [ 1596.600002][ T4978] do_syscall_64+0xcc/0x370 [ 1596.604509][ T4978] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1596.610394][ T4978] RIP: 0033:0x45a6f9 [ 1596.614308][ T4978] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1596.634093][ T4978] RSP: 002b:00007f0e163dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1596.642501][ T4978] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a6f9 [ 1596.650465][ T4978] RDX: 0000000000000008 RSI: 0000000020000080 RDI: 0000000000000003 [ 1596.658530][ T4978] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1596.666496][ T4978] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0e163dc6d4 [ 1596.674463][ T4978] R13: 00000000004cbbd4 R14: 00000000004e5860 R15: 00000000ffffffff [ 1596.683843][ T4978] Kernel Offset: disabled [ 1596.688180][ T4978] Rebooting in 86400 seconds..