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"]) 23:48:41 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$IMCLEAR_L2(r0, 0x80044946, &(0x7f0000000140)=0x202) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x4, {{0x2, 0x4e20, @remote}}}, 0x88) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x118, r1, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100000001}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4c9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffe}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2559119}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x905b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}]}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x4000}, 0x20004000) prctl$PR_GET_DUMPABLE(0x3) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={r0, r0}) r2 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xc8, r3, 0x800, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xb}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1f9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5d26}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) read(r2, 0x0, 0x0) [ 1826.777948][T12408] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) userfaultfd(0x800) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xc2}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)={0xd4, r8, 0x2, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7a9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK={0x70, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x30}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}]}]}, 0xd4}}, 0x10) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000000)={{0x0, 0x34aba6e8}, {0x3, 0x5dc}, 0x100, 0x0, 0xd3}) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:48:43 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:43 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x40) fsync(r0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000040)={{0xffffffffffffffff, 0x3, 0x68f, 0x0, 0x5}, 0x200, 0x7, 0x7fffffff}) read(r0, 0x0, 0x0) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_DQEVENT(r1, 0x80885659, &(0x7f0000000140)) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000100)={0x8000, 0x183a}) [ 1828.810030][T12430] bond0: Releasing backup interface bond_slave_1 [ 1828.925046][T12436] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:44 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r2, 0x0, 0x2d, &(0x7f0000000100)={0x0, {{0x2, 0x4e22, @broadcast}}}, 0x88) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:48:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="000000002005000000000100003321c8c4a581910c5d78ebe6a802a3758a28fd14ae"], 0x1b7) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000040)=0x44) 23:48:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:44 executing program 3: r0 = openat$random(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) fadvise64(r0, 0x0, 0x8, 0x3) 23:48:44 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x40, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000980)='/dev/sequencer2\x00', 0x200000, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000c00)={'vcan0\x00', r2}) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x200000) fallocate(r3, 0x1e, 0xf18e, 0x4) write$uinput_user_dev(r3, &(0x7f0000000080)={'syz0\x00', {0x1ff, 0x3, 0x401, 0x4}, 0x13, [0x0, 0x0, 0xfff, 0x709b, 0xffff, 0x3, 0xecb3, 0x4, 0x10001, 0x4, 0x1, 0x6, 0x101, 0x20, 0x55, 0x36ac137a, 0xcf, 0x20, 0x136, 0x1, 0x1f, 0x1f, 0x81, 0xda5, 0x1, 0x1, 0x1, 0x6, 0x6, 0x2, 0x9, 0x10001, 0x10000, 0x1, 0x3, 0x101, 0x4, 0x200, 0x2, 0xec, 0x4, 0x77a, 0xbb6, 0xc4fa, 0x2, 0x3, 0xfffffffffffffe8a, 0xfff, 0x6, 0x7, 0x7fff, 0xeb, 0x4, 0x9, 0x8, 0x10001, 0x2, 0x9, 0x6d0, 0x6, 0x6, 0x101, 0x729c, 0xffff], [0x3, 0x1, 0x200, 0x2, 0xa657, 0xff, 0xffffffffffff0000, 0x81, 0x7, 0x400, 0xcc5, 0x9, 0x0, 0xffffffffffff08c3, 0xff, 0x9, 0x3, 0x59e5, 0x3, 0xfffffffffffffff7, 0x6, 0x7, 0x8, 0xffffffff, 0x3, 0x80000001, 0x80, 0x0, 0x7, 0xffffffffffff745a, 0x3, 0x3, 0xff, 0x9, 0x30, 0x53, 0x8, 0x0, 0x0, 0x6, 0x7, 0x2, 0x4838, 0x83b, 0x79fa, 0x1, 0x8001, 0x0, 0x7fff, 0xfc00000000000, 0x0, 0xf92, 0x3af3, 0x3, 0xfffffffffffff801, 0x9000000000000, 0x9, 0x2bf64838, 0xbfcb, 0x7f, 0x3, 0xc7, 0x50d8, 0x4], [0x7, 0x8000, 0x7ff, 0x2000000000000000, 0x8, 0x1, 0x8, 0x10000, 0x1, 0x64, 0x9, 0x6367, 0x6, 0x2, 0x3, 0x1, 0x3, 0x0, 0x7, 0x100, 0x6, 0x678000, 0xe485, 0x3, 0xfffffffffffffff9, 0xfffffffffffffffb, 0x0, 0x100000000, 0x8001, 0x2, 0x80, 0x5, 0x2eb, 0x6, 0x90f, 0x7ff, 0x3c, 0xbb43, 0x7, 0x6, 0x8, 0x3, 0xb7, 0x9, 0x32, 0x0, 0x2, 0x4, 0x8471, 0x2040, 0x1, 0xf614, 0x0, 0x0, 0x3ff, 0x2, 0x7f, 0xfbe5, 0x5, 0x7, 0x3, 0xff, 0xf7, 0x61d], [0xff, 0x3, 0x7ff, 0x80000001, 0x8, 0x1, 0x2, 0x4, 0x4, 0x96, 0x9, 0x3, 0x80000000, 0x8, 0x8, 0x9, 0x6, 0x3ff, 0xfffffffffffffff9, 0xfa7, 0x5, 0x9, 0x80, 0x10000, 0x3, 0x598a, 0x4, 0x1, 0x80000000, 0x40, 0x80000001, 0x8, 0x3, 0x7f, 0x2, 0xa866, 0x100000001, 0x8, 0x5, 0x1, 0x800, 0x8, 0xb8, 0x1, 0x8, 0x84, 0x4, 0xfff, 0x0, 0x1000, 0x6, 0x1, 0xde74, 0x7, 0x0, 0x4, 0x6, 0x10000, 0x81, 0x8, 0xdd2, 0x20, 0x1, 0x2]}, 0x45c) connect$can_bcm(r3, &(0x7f0000000500)={0x1d, r2}, 0x10) getdents(r1, &(0x7f00000009c0)=""/127, 0x7f) r4 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000600)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000700)=0xe8) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$bpf(0x0, &(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='bpf\x00', 0x200000, &(0x7f0000000800)=ANY=[@ANYBLOB="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", @ANYRESDEC=r4, @ANYBLOB='\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r5, @ANYBLOB=',uid<', @ANYRESDEC=r6, @ANYBLOB=',\x00']) 23:48:44 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e24, 0xbc0e, @mcast2, 0xff}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x3c) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f0000000240)={0x9, 0x7fff, 0x2, 0x40, 0x2, 0x8, 0x8000, 0x873c, 0x0}, &(0x7f0000000280)=0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r9, @in6={{0xa, 0x4e21, 0x9, @local, 0x6}}}, &(0x7f0000000380)=0x84) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) tkill(r5, 0x1000000000016) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x400, @loopback, 0xfffffffffffff000}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f0000000040)=r10, 0x4) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) timer_settime(r6, 0x0, &(0x7f0000000400)={{}, {r11, r12+30000000}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0xc204, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:48:44 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000040)={{0x2, 0x4e21, @loopback}, {0x306, @random="0c1330615e03"}, 0x1c, {0x2, 0x4e22, @remote}, 'veth0_to_bond\x00'}) read(r0, 0x0, 0xfffffd9d) 23:48:44 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0xfff, 0x10019) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendto$inet(r0, &(0x7f00000003c0), 0xed5f0dd4, 0x0, 0x0, 0x184) [ 1829.749146][T12455] bond0: Releasing backup interface bond_slave_1 23:48:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1829.889657][T12461] cgroup: fork rejected by pids controller in /syz5 [ 1829.902673][T12466] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xa9f, 0x0, 0x1000000014, 0xfa}) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xfbd, 0x0, 0x0, "d80f0490bfbdffa9450a20b69ca616e4", "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"}, 0xfbd, 0x0) ptrace$setregs(0xd, r1, 0x990, &(0x7f0000000000)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1830.011909][T12583] bond0: Releasing backup interface bond_slave_1 23:48:44 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1830.111538][T12589] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x40) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000100)={r4, 0x0, 0x1, 0x2}, 0x10) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) tkill(r5, 0x1000000000016) 23:48:47 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x8) 23:48:47 executing program 0: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x412200, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000280)={0xffffffffffffffff, 0x3, 0x4, 0x3, 0x1}) r1 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) r2 = getuid() mount$9p_virtio(&(0x7f0000000080)='\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2000000, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e733d76697274696f2c6d6d61702c667363616368652c63616368653d667363616368652c756e616d653dd12d2c6e6f657874656e642c76657273696f6e3d3970323030302e4c2c706f73697861636c2c657569643e", @ANYRESDEC=r2, @ANYBLOB='\x00\x00']) read(r1, 0x0, 0xfffffffffffffc9f) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000100)=""/109) 23:48:47 executing program 3: r0 = socket(0x1, 0x1, 0x0) poll(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, 0x0, 0x0) 23:48:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) socket$bt_rfcomm(0x1f, 0x3, 0x3) 23:48:47 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x40, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x800, 0x0) ioctl$KDSKBLED(r1, 0x4b65, 0xfc14) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x1fffff, 0x0) ioctl$VHOST_SET_VRING_KICK(r1, 0x4008af20, &(0x7f00000000c0)={0x2, r2}) 23:48:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000280)="2c3daf", 0x3}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f00000000c0)={0x0, 0x5}) write(r4, &(0x7f00000001c0), 0xfffffef3) fremovexattr(r1, &(0x7f0000000240)=@random={'btrfs.', '\x00'}) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000340)=""/207) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="e5826d421d3b7014a2a9f89eb97818521687498e01d4112c42d79a000000000000000000000000005ffbddb9440ddc21ae832423180e8f1e578f1e74f1f4c20ef8a5c92fe42cfe5a62b623ace8d87f7ff9e1b6466177f13e49aaba6e4b8835e5c34669f8f90b5087c67b6ce4824f880b281f9df2f2667c96540dd478024c3ea9019e47767f646ed9bc68d58bf9d401fc853254b8fac934522892e44f56ecb4244ef11f9e52e47e9b4fe525da63d283e2"], 0xb0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) write$P9_RWRITE(r3, &(0x7f0000000180)={0xb, 0x77, 0x2, 0x4d74ba9d}, 0xb) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) write$binfmt_elf32(r0, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x38, 0x48, 0x9, 0x0, 0x20, 0x0, 0x8001, 0x0, 0x2}, [{0x60000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0x9, 0xc0}]}, 0x58) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f00000001c0)={0x9, 0x7, 0x1, 0xb324, 0x4, 0xfffffffffffffff9}) [ 1832.772229][T12612] bond0: Releasing backup interface bond_slave_1 23:48:47 executing program 0: r0 = accept(0xffffffffffffffff, &(0x7f0000000140)=@un=@abs, &(0x7f00000001c0)=0x80) ioctl$sock_ax25_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@null, @null, 0x4, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) read(0xffffffffffffffff, 0x0, 0x191) r1 = userfaultfd(0x800) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000100)={r0, 0x101}) read(r1, &(0x7f0000000000)=""/254, 0xfe) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) 23:48:47 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x240000000000000, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) sched_setparam(r4, &(0x7f00000002c0)=0x7f) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000140)=ANY=[@ANYRES32=r3, @ANYBLOB="e6000000efcd553815878eed77d63c6cb4c445e8338f47e6323649fa85f4d82eb0863c33cfb3b1f064b01fa4cb408136d74dc40dc0c12937f04cbb54fd98d615f408d076a066a1e9d2e37025d0a8b02ad2c3e47140180489053f36984316ef277a86ca97498e15653cf956b110e25dd6b7869c15060204e0c7949f436174300db3509e54c75cf80db471127dc7447d81b8ccab2847f0b4bc980b22bc9bed1c8ae2d03d66915f3446939de8c1a0f66c1718fe89da24c5ad5da6054c53887d4abb4b825281488a69be02480649821bfae21a39ea90140b97578ddfd8b683f5a6c8a55c59f840cc7579afc1"], &(0x7f0000000240)=0xee) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x5) ptrace$cont(0x18, r5, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r5, 0x0, 0x0) 23:48:47 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1832.942721][T12622] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:47 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:crack_db_t:s0\x00', 0x20, 0x2) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) [ 1833.158436][T12659] bond0: Releasing backup interface bond_slave_1 [ 1833.292308][T12660] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1833.439987][T12627] cgroup: fork rejected by pids controller in /syz3 23:48:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x101) ioctl$DRM_IOCTL_GET_MAGIC(r2, 0x80046402, &(0x7f0000000040)=0x20) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x2, &(0x7f0000000080)={0x0, 0x0}) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f0000000100)=""/51) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:48:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) get_robust_list(r1, &(0x7f0000000140)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f0000000180)=0x18) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x400400, 0x0) r3 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0xfffffffffffffff7, 0xa00) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000240)=r3) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:48:50 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, 0x0, 0x189) 23:48:50 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000700)='/7\x02\xe8\xa4\xef\x9e\xc8e\xd5n\x89\xeb[<\x18-\x14\x8d8\xbf\xfe\x83\x19\xf3(\xd7y\x14h\xcf(f\x06I:\xa4\xea\xcb\b\x81C\xdd\xcc\x00\x00\x00\x00\xf9\b1h\xbam\xa4x\xb1:\xcf\a\x94Z\x7f\xc8\vy\xf2F\xf4\x9d\n3\xd4\x9a[\xee\xaa\t\xbe\x90\xabU3\xd3[y\xd1d^We\xa9\xcb\x86a\"\xba\xb7\xcd\xcf\x88\x9eqO|\x9f\xcf\r\x86\xf4\x15@\x82w\xa8\\\x8c^a\xbe\x991l\\\x16\xd4\xd53\xdd\x9e\x00\x01:\xac\x14^\xf6\xb6\xb1^\xaa\xfa\x02x\x8aV\x87\xe3\xfb\xef\xd0\xb7({,\xf4\xa2cl`\xdc\xf7\xe2f\xad\xaa>\xd4Ts\x10\xb9V!\x91uGTy\xde$X\xff\xb1\xf3={\xb7\xe65\xb6\x1a\x99q^\xc2\xfc\xb0\xc09\x85\x03\xf1]\xc54;\x8d\x01\xec3#\x8f%5\xef\xfe\xc5\xdb\xd5\xb7\xe0\xdd\xec,rV\x82!\xa0', 0x0) pwritev(r2, &(0x7f0000000200)=[{&(0x7f0000000280)="2c3daf", 0x3}], 0x1, 0x4081806) sendfile(r0, r2, 0x0, 0x20020102000007) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f00000000c0)={0x0, 0x5}) write(r4, &(0x7f00000001c0), 0xfffffef3) fremovexattr(r1, &(0x7f0000000240)=@random={'btrfs.', '\x00'}) ioctl$GIO_SCRNMAP(r4, 0x4b40, &(0x7f0000000340)=""/207) clone(0x2502001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$FUSE_DIRENT(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="e5826d421d3b7014a2a9f89eb97818521687498e01d4112c42d79a000000000000000000000000005ffbddb9440ddc21ae832423180e8f1e578f1e74f1f4c20ef8a5c92fe42cfe5a62b623ace8d87f7ff9e1b6466177f13e49aaba6e4b8835e5c34669f8f90b5087c67b6ce4824f880b281f9df2f2667c96540dd478024c3ea9019e47767f646ed9bc68d58bf9d401fc853254b8fac934522892e44f56ecb4244ef11f9e52e47e9b4fe525da63d283e2"], 0xb0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') recvfrom$unix(r1, &(0x7f0000000040)=""/4, 0xebc3276d6d4b1cd2, 0x100100, &(0x7f0000000100)=@abs, 0x930212) write$P9_RWRITE(r3, &(0x7f0000000180)={0xb, 0x77, 0x2, 0x4d74ba9d}, 0xb) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) fcntl$setstatus(r0, 0x4, 0x2800) write$binfmt_elf32(r0, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0xffffffff, 0x0, 0x38, 0x48, 0x9, 0x0, 0x20, 0x0, 0x8001, 0x0, 0x2}, [{0x60000000, 0x401, 0x2, 0x0, 0x0, 0x0, 0x9, 0xc0}]}, 0x58) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f00000001c0)={0x9, 0x7, 0x1, 0xb324, 0x4, 0xfffffffffffffff9}) 23:48:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="ff037a31"], 0x4) 23:48:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() tgkill(r1, r1, 0x1f) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x42000, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000140)="bcaa9305627eef5fd8f88276ac0f7bac27e9f810dea78d956a70c7b735f6ebe6edc2b13e85cacbdc4497734c6c9c6047a91a5d8c0a22f0ac5416730f7cf0bf56b42dd906acf9e5e1d036c91a493404efa2b893cc2f4bcb567f15f2814f0d4eaa03b208af7789a22118be67ad5cdb0cdba5c614d74888f736bf84f1b9f559e6194468fbd08c20a23656ca6cc42377504e48216d870c60e5928ec2b69f1c7277ed1756f92da37adbc4a8c6900fe8f8a65f47bb628cecd099") tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1835.798534][T12775] bond0: Releasing backup interface bond_slave_1 23:48:50 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1835.954290][T12783] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSBRK(r1, 0x5409, 0x4) tkill(0x0, 0x5) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e24, @loopback}, 0x10) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) ioctl$KVM_DIRTY_TLB(r2, 0x4010aeaa, &(0x7f0000000040)={0x3f, 0x5}) ptrace$cont(0x1f, 0x0, 0x0, 0x0) 23:48:50 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1836.126921][T12807] bond0: Releasing backup interface bond_slave_1 23:48:51 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xfffffffffffffff9, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:48:51 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1836.244734][T12814] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1836.370559][T12828] bond0: Releasing backup interface bond_slave_1 [ 1836.445944][T12829] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:48:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x68, 0xfffffffffffffffc) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$PPPIOCGUNIT(r3, 0x80047456, &(0x7f0000000040)) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r3, 0x4020565b, &(0x7f0000000000)={0x8001007, 0x6b, 0x2}) ioctl$GIO_CMAP(r3, 0x4b70, &(0x7f0000000100)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:48:53 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x2, r1}) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f000072e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000ad6fad)='\x00', 0x1, 0x200000003fffffd, 0x0, 0x0) 23:48:53 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="b93c56bdd4a0c6113915552d458883b269687add5d5c2b3502c9fd39dc15baa691", 0x21) 23:48:53 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1838.829208][T12838] bond0: Releasing backup interface bond_slave_1 23:48:53 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xfffffffffffffff8, 0x800) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) getpeername$inet(r4, &(0x7f0000000740)={0x2, 0x0, @broadcast}, &(0x7f0000000780)=0x10) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x8ee6}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, r3}) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000240)) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000140)={r5, r6, 0x20}) llistxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x33) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r8, r9+10000000}}, 0x0) tkill(r7, 0x1000000000016) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000300)={"4ba4f432cc4fd3b794adc68f57505267df52fd571fc2995c66da974e88b4de29a62b3ee6741c207585285e143c9dfb3e5a944e7a04c0d9f06e4e121a4f4ecc3ae4313037503e73385ba8b7a6bbeaba7bbff537c8cb92fb1468fd7d44821895cdf546c42a379e51aa893b1877301a3fb4a139fcf61ae2cffddfd2a5e2f3b4fb8584732a2aeadecc938130c103cd126aa1b52b8d4b66044a461631752c3a8e2062dbbf0096ebb6b3f5740bdade44552b992095b10cc94d7ada6f60e720b87b8eacf60a32faf2c43d7a80f612cb629179f36986497159f1aec22f62d09e62d184c66d58763f1eb9860ee242811e6456ab93f5690e96c262134cbe04a9a4d48ca21537386688e21ba05e0a890a1a36ffd25c24643195dc340322f7da61a42543f92c484b1d7337ab0c498bde1e3a59e9c6f073cc66a1a7d74e9fba9003e17da28b235efde0946b783e2139f0f9aced9fc4c3fa4d38da897686c486ff185ff67f54825019ff4afb3df3c757c273af79c9f7adee21d14c0f4d2d732a1c1c41e6beeabd48392dbb6062503ac5802dcb55254491cac3984b19889799f54fb352b236e1b3643b4930240628072f1de979d0603d6cf3abc819bdba45d82e68d8ec45d2a62a6e3c036206c14474af321d52d89cc48165420b9e9a5999c5d004bea654ca57b5114c6a1bffaa9e47a122d94b272dd0f201ffa9caf46b060c710dee9c8700dff0ddbb19c2fef4e09069bdb27141ce8369cfbe8c6e060405f0687021cee178aa3f90a9691aa5456f09b7784d5ebf4e534e4641082a88a991514d7a33912cb8a8e96776c28efee8ae63a590c53e2b17a3f4810d3b4dcd1f9c6455293aae7ae1c81068ef8004295c2e1b724d8e70af48e634d54e701f0c95995aa2ee11fb6357f39dd82d07456830c2b39c883058dee1fd445297b4327c3a53be88d89a7d1a225f29c2fafbe98a8cc0f341adf66f3c6cb1a0a99c0415c31f1b9104ac626b91662d33b2b8d500b80f64ce1446e00907848747636a321e44d6bf244655151006d42148f58f6df67c67ed1bf591088bb9bf6b0de19e98d02049f0b479174e14da4890abb101959481a7617a184beb32f1b29900868ec8e31079cf4ff150dd6becd07a797301b87e32447e85e67b3c84605b6c14c6da1bc20c54089e6b8816b02f4315c0a6bc8026e40fb87494cf9898e7d84b9d52760d85f012346d674e359acace2cdb2ce8951d696e7da6ed5f4471ae4c3eec7499845c382d7f26f5d3f1b4b3a9752f7ff3c2a8ca19de2439c1286be52a48666a3fceaf1db7cf7d439f6aadfa6a055b42332b1faaba5b8daf8285871ddee55a76fbd48460115047f25a0dedef90ee02baa8e6ff52b7e77253775cdb3489131c548305e54de6838eeb3088c7c7f242cf8190269381951085a474206a354b65eb0c8edb867f1400e36ba9e3bac29a72d0"}) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f0000000180)={0x70d687ae, 0x7, 0x6}) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='s\x00\x001'], 0x4) 23:48:53 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:53 executing program 4: r0 = accept$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ioctl$SIOCAX25GETINFOOLD(r0, 0x89e9, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x10, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000100)="607c6316995a9b629f944923f3600c82500eed79e9de8b6033ad21a774125fac510b57abb33f106c4d3354d6da1a7542136e2a6580e16820e168319cd8082d8cfff7a77ee131f788c4b5f71d56dc956aa2c8c3241e4c72f4cbab0d") clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) tkill(r5, 0x1000000000016) 23:48:53 executing program 1: r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1839.012422][T12852] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1839.030237][T12853] bond0: Releasing backup interface bond_slave_1 23:48:53 executing program 5: socket$nl_netfilter(0x10, 0x3, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) fdatasync(r1) 23:48:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x200, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) getsockname$ax25(r2, &(0x7f0000000140)={{0x3, @default}, [@default, @bcast, @remote, @default, @rose, @default, @null, @bcast]}, &(0x7f0000000080)=0x48) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:48:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x1, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:48:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="04000000"], 0x4) 23:48:54 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1839.792801][T12861] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1839.801955][T12859] bond0: Releasing backup interface bond_slave_1 23:48:54 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1839.980895][T12868] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1839.991745][T12876] bond0: Releasing backup interface bond_slave_1 23:48:54 executing program 1: r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1840.060979][T12879] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1840.078108][T12905] bond0: Releasing backup interface bond_slave_1 23:48:55 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1840.734085][T12906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1840.750266][T12910] bond0: Releasing backup interface bond_slave_1 23:48:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x20000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x4, 0x100, 0x7f, 0x40, 0x21, r1, 0xa}, 0x2c) r2 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=r2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 23:48:55 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1840.969304][T12912] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1840.980644][T12915] bond0: Releasing backup interface bond_slave_1 [ 1841.039831][T12920] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1841.060584][T12923] bond0: Releasing backup interface bond_slave_1 [ 1841.668889][T12924] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1841.684679][T12931] bond0: Releasing backup interface bond_slave_1 23:48:56 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x53, 0x6, 0x1, "6657d5d481b3d77bc8de717164f3b5cf", "dd6df4cda88adcf13a24dd943c7f043b3c616d824488508b56588827aee257a8c19de1857d6fccfe706965b2a8f97e51139c00b805696613d6d3d5ec9c69"}, 0x53, 0x3) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:48:56 executing program 1: r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:56 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) seccomp(0x0, 0x1, &(0x7f0000000080)={0x9, &(0x7f0000000000)=[{0x6, 0x6, 0x4, 0x1f}, {0x8, 0x100, 0x6, 0x1000}, {0xffffffffffff8e51, 0x9e6, 0x200, 0x9}, {0x9, 0x1, 0x7, 0x7}, {0x800, 0x8000, 0x2, 0x4b75}, {0x3d1e, 0x8, 0x9c}, {0x10001, 0x7, 0x46, 0x9}, {0x100000000, 0xb4c, 0x5, 0xfffffffffffffff7}, {0x2, 0x8, 0x0, 0x80000001}]}) 23:48:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xfffffffffffffff8, 0x800) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) getpeername$inet(r4, &(0x7f0000000740)={0x2, 0x0, @broadcast}, &(0x7f0000000780)=0x10) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x8ee6}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, r3}) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000240)) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000140)={r5, r6, 0x20}) llistxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x33) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r8, r9+10000000}}, 0x0) tkill(r7, 0x1000000000016) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000300)={"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"}) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f0000000180)={0x70d687ae, 0x7, 0x6}) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='s\x00\x001'], 0x4) 23:48:56 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1842.023871][T12935] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1842.042089][T12940] bond0: Releasing backup interface bond_slave_1 [ 1842.147035][T12952] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1842.163165][T12957] bond0: Releasing backup interface bond_slave_1 23:48:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x480400, 0x0) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000100)={0x8001, 0xf, 0x4, 0x4, {0x0, 0x7530}, {0x2, 0x2, 0x3, 0x3a, 0x100000000, 0x1000, "cd34cd22"}, 0x7, 0x1, @fd, 0x4}) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73ff4d49f6fffde109dd95c49d5e07000000000000ff036688d59ce902"], 0x4) 23:48:57 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0xfffffffffffffff8, 0x800) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) getpeername$inet(r4, &(0x7f0000000740)={0x2, 0x0, @broadcast}, &(0x7f0000000780)=0x10) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x8ee6}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r3, 0xc00c642e, &(0x7f0000000100)={0x0, 0x80000, r3}) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000240)) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000140)={r5, r6, 0x20}) llistxattr(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740), 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$UI_SET_MSCBIT(r4, 0x40045568, 0x33) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r8, r9+10000000}}, 0x0) tkill(r7, 0x1000000000016) ioctl$KVM_SET_XSAVE(r3, 0x5000aea5, &(0x7f0000000300)={"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"}) ioctl$CAPI_REGISTER(r3, 0x400c4301, &(0x7f0000000180)={0x70d687ae, 0x7, 0x6}) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='s\x00\x001'], 0x4) 23:48:57 executing program 1: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @broadcast}, &(0x7f00000000c0)=0xc) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:48:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x4e, 0xfffffffffffffffe) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r4, r5+10000000}}, 0x0) tkill(r3, 0x1000000000016) write$binfmt_misc(r0, &(0x7f0000000200)={'syz1'}, 0x4) 23:48:57 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0xfffffffffffffe29, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xf, r1, 0xffffffff, &(0x7f0000000000)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:48:57 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1843.039685][T12961] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1843.121404][T12967] bond0: Releasing backup interface bond_slave_1 23:48:58 executing program 2: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/fscreate\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(r3, 0x11, 0xb, &(0x7f0000000140), &(0x7f0000000180)=0x4) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x5) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000200)={0x1, 0x1000, 0x1c}) ptrace$cont(0x18, r4, 0x0, 0x0) syz_open_procfs(r2, &(0x7f00000001c0)='mountstats\x00') ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x0, 0x0) 23:48:58 executing program 1: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1843.213462][T12974] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1843.243823][T12999] bond0: Releasing backup interface bond_slave_1 23:48:58 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) 23:48:58 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r0, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1844.019967][T13002] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1844.035136][T13007] bond0: Releasing backup interface bond_slave_1 23:48:59 executing program 1: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:48:59 executing program 2: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x802, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x2, 0x0, &(0x7f0000ffb000/0x2000)=nil}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1010000033) ptrace$cont(0x18, r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x4e21, @local}}, 0x0, 0x56d2, 0x0, "d8b56fed694a595a53cb2c2557603d0f7fc10842d3765fc292ddc56265dd8cb65736730b94fcd125d5c04b7eab9d4b18258788ea9202e39fa37f383516206fd6bbe0f5c6f01ea0edbde3b7cfa1572e3f"}, 0xd8) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1844.109941][T13011] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1844.132766][T13025] bond0: Releasing backup interface bond_slave_1 [ 1844.961913][T13026] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1844.971234][T13029] bond0: Releasing backup interface bond_slave_1 [ 1845.030197][T13034] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="04000000"], 0x4) 23:49:00 executing program 3: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1845.751533][T13044] bond0: Releasing backup interface bond_slave_1 23:49:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000040)='system_u:object_r:mqueue_spool_t:s0\x00', 0x24, 0x1) tkill(r4, 0x1000000000016) 23:49:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000000)) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a31c74fb7214f4a84492093ee0886ac47e3c7abfd513888e1a0f4456154938f80566d52a9b1a0c07eaa46a2beb5f361f417c79e78f1af025a0ad1fffb37043a2d6f2b6627eab1bedecb3a82c343a4a863f0798b6ffe9bea67bcee0c10fb5bdf4ba7d263e7ce53382b60b6229586357d65ab0544b713d3920d73104a4a89d058ea7c8e912b170ae725e58dddbe81c883d1ae2079c892556d5d2862031be3c60f1972efea23ba8cd9776387fa9b9e4f08b01576f5c4534d924ac3642dcd2910"], 0x4) 23:49:00 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:00 executing program 0: r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:01 executing program 3: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1846.623144][T13048] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1846.639142][T13059] bond0: Releasing backup interface bond_slave_1 [ 1846.736689][T13061] bond0: Releasing backup interface bond_slave_1 23:49:01 executing program 0: r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:01 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1847.000673][T13064] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1847.011542][T13065] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1847.032498][T13071] bond0: Releasing backup interface bond_slave_1 23:49:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)="4de8b222700a6ff20976dafc7b46eb2401a28706b5b7e544fedf49009bfabd65004ed5f57c7e9aa99b29a9e1f495aa1e282c20f5b7f8976b4f47d5a0fa09b034c032d3de2f8bfbc9fa09f93be52bba4dd7069d6fa021db08894f1602d977de53c336799230a858e107f1aa008b0935990c62009bd58156c8a65bcf73948fc0ead7f36a") ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:02 executing program 3: mkdir(0x0, 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1847.586551][T13074] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1847.600517][T13080] bond0: Releasing backup interface bond_slave_1 [ 1848.006395][T13081] bond0: Releasing backup interface bond_slave_1 23:49:02 executing program 0: r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:02 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1848.060631][T13083] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1848.073322][T13082] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1848.093487][T13093] bond0: Releasing backup interface bond_slave_1 23:49:03 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x4c8040, 0x0) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000080), 0x4) r3 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x5) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) r4 = dup(r0) write$P9_RGETLOCK(r4, &(0x7f0000000000)={0x1f, 0x37, 0x1, {0x2, 0x2, 0x7, r3, 0x1, '@'}}, 0x1f) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r3, 0x0, 0x0) [ 1848.563682][T13094] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1848.588129][T13101] bond0: Releasing backup interface bond_slave_1 23:49:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000140)) ioctl$VHOST_GET_VRING_BASE(r1, 0xc008af12, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{r8, r9+30000000}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000080)={0x13, 0x10, 0xfa00, {&(0x7f0000000240), r10, 0x2}}, 0x18) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:03 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1849.130413][T13103] bond0: Releasing backup interface bond_slave_1 23:49:04 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1849.191959][T13104] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1849.202264][T13105] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x125, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:04 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1849.251241][T13121] bond0: Releasing backup interface bond_slave_1 23:49:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() ioctl$VIDIOC_G_PARM(r3, 0xc0cc5615, &(0x7f0000000240)={0x6, @capture={0x1000, 0x1, {0xfffffffffffffffb, 0x2}, 0x85b, 0x3e00}}) readahead(r1, 0x0, 0x2) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r6 = shmget(0x1, 0x4000, 0x100, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(r6, 0x2, &(0x7f0000000100)=""/183) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{r7, r8+30000000}, {0x0, 0x1c9c380}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:49:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() fcntl$setownex(r1, 0xf, &(0x7f0000000100)={0x0, r2}) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x8, 0xfffffffffffffffe) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x400, 0x100) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r4, 0xc0305602, &(0x7f0000000140)={0x0, 0xa85}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) tkill(r6, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="f367f0ac7380de955918a67aba"], 0x4) 23:49:04 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000040)={{r7, r8+10000000}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000100)=ANY=[@ANYBLOB="400000040000000008000000000000000000000009000000040000000000000031c378150000000094000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003f000000000000000400000000000000000000000000000000000000000000000801000000000000000000000000000006000000000000000900000000000000e900000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000100000000000000ffff0000002000000000000000000000000000000000000000100000000000000000000000000000"]) 23:49:04 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1850.027108][T13126] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1850.041800][T13149] bond0: Releasing backup interface bond_slave_1 23:49:05 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1850.226661][T13192] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1850.236452][T13238] bond0: Releasing backup interface bond_slave_1 23:49:05 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1850.279138][T13246] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1850.305482][T13464] bond0: Releasing backup interface bond_slave_1 [ 1850.987495][T13468] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1851.012528][T13472] bond0: Releasing backup interface bond_slave_1 [ 1851.186789][T13475] bond0: Releasing backup interface bond_slave_1 [ 1851.230059][T13476] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1851.241196][T13477] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) clock_gettime(0x6, &(0x7f0000000000)) 23:49:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x2000000000) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:06 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:06 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:06 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1852.021559][T13488] bond0: Releasing backup interface bond_slave_1 23:49:06 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0xfffffffffffffdb2, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x4, 0x408100) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1852.102764][T13489] bond0: Releasing backup interface bond_slave_1 23:49:07 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1852.922117][T13491] bond0: Releasing backup interface bond_slave_1 23:49:08 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1853.083654][T13495] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1853.097125][T13499] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1853.108856][T13500] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:08 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:08 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:08 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1853.254682][T13620] bond0: Releasing backup interface bond_slave_1 [ 1853.380015][T13623] bond0: Releasing backup interface bond_slave_1 [ 1854.119656][T13626] bond0: Releasing backup interface bond_slave_1 23:49:09 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1854.294480][T13627] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1854.305995][T13630] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1854.316822][T13631] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1854.388990][T13641] bond0: Releasing backup interface bond_slave_1 [ 1854.487619][T13644] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:09 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x400, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f00000002c0)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000100)=[{0x20, 0x0, [0x4f, 0x401, 0x7e4d, 0x6, 0x80000001, 0x101, 0x8f, 0x6, 0xfffffffffffffff7, 0x3ff, 0x7, 0x4, 0x101, 0x80000001, 0x4, 0x10000]}, {0x2, 0x0, [0x1, 0xffffffffffffff81, 0x0, 0x9, 0x1, 0x119, 0x8, 0x200, 0x6, 0x4, 0x9b, 0xff, 0x0, 0x1, 0x8, 0x7]}, {0x20, 0x0, [0x80, 0x6, 0xffffffff, 0x5, 0x8, 0x7f, 0x7, 0x5, 0x6, 0x200, 0x85f, 0x208b, 0x25, 0x4, 0x3, 0x5]}, {0x4, 0x0, [0x1f, 0xd6b6, 0x7, 0x3ff, 0x7, 0x4, 0x7ff, 0x4, 0x7fffffff, 0x0, 0x2a5, 0x0, 0x0, 0x9, 0x7, 0x30000000]}, {0x6, 0x0, [0x1000, 0x572, 0x2, 0x1f, 0x9, 0x3, 0x8, 0x9, 0x5, 0xffffffff80000000, 0xfff, 0x3, 0xfff, 0x7, 0x6, 0x3ff]}], r3, 0x1, 0x1, 0x168}}, 0x20) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r1, 0x100000000001b) 23:49:09 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000140)={0x0, 0x0, [], @bt={0x4, 0x7fff000000, 0x0, 0x0, 0x20080, 0x1, 0x15}}) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:09 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:09 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1855.066337][T13650] bond0: Releasing backup interface bond_slave_1 23:49:10 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$nfs4(&(0x7f0000000000)='nfs4\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x7, &(0x7f0000000480)=[{&(0x7f0000000080)="f787031a8aba5f0c1f420b5c51883be71e3f2307a2d786aaf05a1c8e8bcc6337", 0x20, 0x6f92}, {&(0x7f0000000140)="3c91f954b6254e750da168a22cd469a60ccb4e1a699c682f6200e51608df16ab7a0b0d2d36237f37c94345c933806a0ae5f2f904ace31f69a0157e7bf4f93e66f530362c5bc1ac73097fdfdcef6a9239a28cfd255aa33f8e0046370974dfa731163f3f5db90109786ab57e0680ff75bf4866c9032fb14e4a40101cb6870ce68cd4329fa393a3292e32bec3c46c3ff214dddf46d26ab0245c7d9888f5d69d37b77447ce8c86481d938b9a", 0xaa, 0x1000000}, {&(0x7f0000000200)="fea42e0f5cb2cfc2a3a125451e71478e4e750d440691569f7a3408d8c0e2d4462dc4bb75c734ecbfaabc640830964590f698810dcabe7b91e0fd7197571b8345e159244fc1efaf8d4860fa3d699456b24ef9f826187ef4c4290f5053957201466125d97e433b75042c703f286393f476380ffdbf23ebbd09736113318fa838a2a225e5666ed4f2c91243dc35b08c02fd386254c55e6f2dc8e88f9d3f420346f38cd554b613cb440a78731376", 0xac, 0x3ff}, {&(0x7f00000002c0)="1c49476494f3c51fad0d25b9ad30d616d17ec967a369d3354ec9927fb1aef90c80afdb923697de751e79616e3ee91971adf046cd2b0e2498ef8fb7a5e53e6d2fad298d89f26eb4fe8a70d4", 0x4b, 0x354}, {&(0x7f0000000340), 0x0, 0x8da8}, {&(0x7f0000000380)="739d29ef4bda56b030d11901fc9bf2526071f7771e87ba0cf30ce5c7a574c946a3e446e6bd219c59b896f8c26b12ecb2d1ae8891de71778e3e2af8aacab21de10a4a0ed69927", 0x46, 0x3}, {&(0x7f0000000400)="247c6923334f8234898cb1f6e40d4142ef42d7c43db23c096a1dabb4ebfd3c29887983f7dc4c7ebd65bacb8f56e1c52c883ef57fe3242fd2680213c4f91de79c7ff5", 0x42, 0xfffffffffffffc01}], 0x800000, &(0x7f0000000540)='/%*mime_type\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000580)) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1855.168717][T13648] bond0: Releasing backup interface bond_slave_1 23:49:10 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) getrusage(0x0, &(0x7f0000000100)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) write$USERIO_CMD_REGISTER(r3, &(0x7f0000000000)={0x0, 0x10001}, 0x2) r4 = gettid() r5 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x430082) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000f7865fff0700000000010020c691f600176ab6006b24518db9f3a8a428348c62054e2fae42002a3c4565742d83dae9681e985987663b19"], 0x4) ioctl$LOOP_SET_DIRECT_IO(r5, 0x4c08, 0x200) [ 1855.953580][T13653] bond0: Releasing backup interface bond_slave_1 23:49:11 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1856.128717][T13658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1856.139572][T13661] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1856.155882][T13663] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:11 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:11 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x100003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x20100, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x40) tkill(r2, 0x5) ptrace$cont(0x18, r2, 0x0, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f0000000240)='\x00', 0x1, 0x3) ptrace$setregs(0xf, r2, 0x0, &(0x7f0000000140)="d0ce8084b6c47d7afa43d3fb4734ba5eb7bf9f640c54fece8d76a33141443dfcbf1d411cfd5b04f029df01b48c4e06f519849505f04d2e63613a3cce27ba2765eda3adeb331cb898cda7e74132dc49b5d2089e68585bf56c60f823a8c9b609232f966ff916443a01633baa847f49f347f514d7dabe1615803d1171b00515ee77ed82c7441f6c3bfd58c612f3150eb4feeab048b938e661a13bdd1a921b80273193ba2489b348e372b8ff0dc6f710c7871d6b998971419fa80bef86558a57e5490fa9184210a739e8ce38330f06aeb034a6505e38b7386fcb5b95061162975c343d5815cdec7d3c05") ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) [ 1856.243616][T13787] bond0: Releasing backup interface bond_slave_1 [ 1856.342146][T13796] bond0: Releasing backup interface bond_slave_1 23:49:11 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xffffffff84ca7de0, 0x200201) connect$tipc(r2, &(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1, {0x43, 0x4, 0x3}}, 0x10) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1857.173971][T13793] bond0: Releasing backup interface bond_slave_1 [ 1857.343252][T13791] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1857.354397][T13798] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1857.372761][T13799] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr], 0x20000000}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000600)={'filter\x00', 0x7, 0x4, 0x4c0, 0x138, 0x138, 0x278, 0x3d8, 0x3d8, 0x3d8, 0x4, &(0x7f0000000000), {[{{@arp={@empty, @multicast1, 0xffffff00, 0xffffffff, @empty, {[0xff, 0x0, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}, 0x4, 0x100000000, 0x0, 0xfff, 0x9e0e, 0x6, 'bridge0\x00', 'rose0\x00', {0xff}, {}, 0x0, 0x8}, 0xf0, 0x138}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x1, 0x55acab81, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @empty, @dev={0xac, 0x14, 0x14, 0x12}, 0x5, 0x1}}}, {{@uncond, 0xf0, 0x160}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x4, 0x7, 0xf95f, 0x0, 0x0, "442f9158d11877eed3b19f122aee052b60e94baaf503bf02ca564d9ec02e77edc91ef33c5467ddcb820cedf21abf12112337ae9f6ebef5268508aade0f7e8c75"}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x510) tkill(r4, 0x1000000000016) 23:49:12 executing program 3: r0 = creat(&(0x7f0000000400)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000003c0)) gettid() lstat(&(0x7f0000000e40)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000c40)) geteuid() sendmsg$netlink(r2, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000e80)=ANY=[@ANYBLOB="1000c1000c00580008fd000000000000158f22a81f129101009248d171b84662a528830929e23ef6a05d731c03518ccb0786e580513e5ef6b2b047398b78e42915c5e860db4ed02aabef5d388f08d13d808a8236f7d85dd5e94ffebaf51c2d52b6f3295230436d2404846ab6d69aa68dce1051cfe7f88355244c2721a153b8f7b0ae30d8335ab8a6cf946592b05c0ad317d94cd0394c18cfbeff39c10012a5c0c2d9c030e526fe582345043167901673ce4ee1f2eff1e314f887ab1293e41bb71865e2a2b329206a42a52791fba38d1576cab4af327365af5e6fc8f06b6487c80e76f21d2dc662545aa75555a5ee0c2d2ed87bbbe8682b458cdc9e18230c007800001900000000000000000000000000000000005cafd50c65de64a95b5400964e598c75505d06fe660fd639bc71051c660df8bff3cde1e9f077b597448bbf23cd6fa9c847f4a7d547524d4dcf10bbf853339e4ec28508180b50bf8bc841fdc65ebb8c5c04a62393a75d61167df90f71287aae05590b56684090bc4f8100000000000000000000"], 0x1}], 0x1}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000680)="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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fcntl$getown(r2, 0x9) 23:49:12 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:12 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x5) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000140)={0x2, 0x5, r2, 0x0, r4, 0x0, 0x1000, 0xe39c}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 23:49:12 executing program 0: 23:49:13 executing program 0: [ 1858.221888][T13819] bond0: Releasing backup interface bond_slave_1 [ 1858.334063][T13830] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r5, 0xb00, 0x70bd25, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfbf6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x44459d4f}]}]}, 0x58}}, 0x80) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:13 executing program 0: 23:49:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x400, 0x0) r0 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x7) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) socket$bt_rfcomm(0x1f, 0x3, 0x3) keyctl$clear(0x7, r2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000200)="353a8a1d221d00cbeec27213971feb5cd40ac3fef5d06d60931e668e27a4fd49f0808a4a7ff9b81747d6fb6a3862d04c821295dac8f2cd471579aa4dadc8551bab86a49d535138f105e6720685c8d608f458b6112b") ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:13 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:13 executing program 3: r0 = creat(&(0x7f0000000400)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000003c0)) gettid() lstat(&(0x7f0000000e40)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000c40)) geteuid() sendmsg$netlink(r2, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000680)="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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fcntl$getown(r2, 0x9) 23:49:13 executing program 0: [ 1859.027547][T13945] bond0: Releasing backup interface bond_slave_1 [ 1859.272071][T13965] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:15 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000000)={0x3ff, 0x9e, 0x0, 0xfffffffffffffff9, 0x5, 0xff, 0x26b55a9d, 0x400, 0x9, 0x20, 0x1f}, 0xb) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000040)={[], 0x321, 0x5, 0x6f9, 0x7f, 0x9, r1}) write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="73797a3154ac0d2f83613c37a6b6d3d3db2f17846ab000a169b78aff04a565b9d5c979b1dca53c590f8462b4876dab9c9a081ef82b865bb5a80d6985aea378039e1f308b3a3f6d0830dab1bb290a73bbadc0bbf587502aaea98eb7e792efdefb3731d6a11d21732f24c4b996dec0fc7e661e877fef5d26c0855826e42fd30cbbc8b512de2df29464ca84a5cd1fc9c9d2287c93e4c77f5e57d4762e5c56397ba912d6617189835d8f37ecb450760314bfbb6b2960858e4e9b0a71d86788ade4a05af1891c8949cc4fdf807e303efbc4e7ba41cfdeb72aff7f0000d74cd15e64c587b0457ccce6dfb1ee423ebc1168c72c7477ca390886a4ce7a"], 0xf9) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:15 executing program 0: 23:49:15 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:15 executing program 3: 23:49:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x26, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x2400, 0x0) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f0000000200)={0x1, r3}) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000040)=[0x7fff, 0xffffffffffffffc0, 0x4], 0x3, 0xd245, 0x0, 0x7, 0x80000000, 0x80, {0x401, 0xbd, 0x8, 0x6a7b, 0xa3, 0x1, 0x47, 0x1ca, 0xc06, 0x1, 0x9911, 0x9, 0xea5f, 0xd8e, "bbe809be311c4720fe6ed65bd7ddc07f64045934ce49253526e0c8aced1850c4"}}) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1861.214253][T14069] bond0: Releasing backup interface bond_slave_1 [ 1861.328143][T14080] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() ioctl$VIDIOC_S_TUNER(r3, 0x4054561e, &(0x7f0000000000)={0x7, "65df511fdc13e4743023b35f3a3075175d91c20d472c28796b9669c3aebeea51", 0x5, 0x8, 0x40, 0x5, 0x8, 0x0, 0x100000001, 0x6c}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:16 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x400021020017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) r1 = dup(r0) sendmsg$nl_route_sched(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)}, 0x0) 23:49:16 executing program 0: syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x400021020017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x0, 0x0, 0x0) r1 = dup(r0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 23:49:16 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair(0xa, 0x0, 0x6, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$packet_int(r2, 0x107, 0x1f, &(0x7f0000000080), &(0x7f0000000140)=0x4) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x4100, 0x0) ioctl$VIDIOC_ENUMSTD(r3, 0xc0485619, &(0x7f00000001c0)={0x200, 0xff06ff, "6c3de691d59570befb0e961ab58ecc8a787538abde11d9b6", {0x5, 0x2}, 0x5}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) signalfd4(r0, &(0x7f0000000000)={0x9a}, 0x8, 0x800) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:16 executing program 0: syz_execute_func(&(0x7f0000000180)="3666440f50f564ff0941c3c4e2c9975842c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) 23:49:16 executing program 3: syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c446c9975842c4c27d794e0066420fe2e33e0f1110c442019dcc66460f29bef7ffffff6f") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 23:49:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)) write$P9_RSTAT(r2, &(0x7f0000000100)={0x42, 0x7d, 0x1, {0x0, 0x3b, 0x3b4, 0x1, {0x48, 0x3, 0x3}, 0xc9800000, 0x7, 0x8000, 0x0, 0x2, '^:', 0x5, 'nodev', 0x0, '', 0x1, '/'}}, 0x42) tkill(r3, 0x1000000000016) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000000)={[{0x7f, 0x7, 0x5, 0xad, 0x9, 0x7, 0x100000000, 0x6, 0xffffffff80000000, 0xff, 0x5bf, 0x5, 0x20}, {0x7df, 0x1ff, 0x8, 0x8, 0x9, 0x100000001, 0xaa3, 0x37d1, 0x3, 0x9, 0x6e, 0xae9, 0x350c}, {0x8, 0x2, 0xfffffffffffffff7, 0x7, 0x19a0, 0x33, 0x1e, 0x3, 0x1, 0x8c4e, 0x8001, 0x7, 0x253}], 0x20}) 23:49:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) r2 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='dns_resolver\x00', 0xfffffffffffffffe) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x210000, 0x0) ioctl$sock_netrom_SIOCDELRT(r3, 0x890c, &(0x7f0000000180)={0x1, @default, @netrom={'nr', 0x0}, 0x19, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x7f80, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast]}) ptrace$setregs(0xd, r1, 0x9c, &(0x7f0000000200)="56db85dcfbef50cdd9190d7d95600ef62585f5643b9672203373cd74a2e860e7decc60d56308f2782e4cfd915f5e3c66729405f3c8f21fecd97a198e5fb038f1d97888709a9428e0ba324769729ea8c42ea80e000f19c748db463da362f5093b8513a9b9c75ef53209478b99b3cb3d3de1cac3f25f7181ac78a13c1d46209f667adda198708678e04d8e1969fc844f86d5644492aeb9785f9b09bb5819a45125cc54fa40141de8dd2d24ff2aa9745eda84e3610c7e0dd15836fc6b30") keyctl$clear(0x7, r2) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:17 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001500)='/dev/autofs\x00', 0x0, 0x0) syz_execute_func(&(0x7f0000000140)="64ff0941c3c4c3597ca50050666600c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000280)=0x100000001, 0x4) clone(0x1fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r1, &(0x7f00000000c0), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000180), 0xfe0c) rt_sigpending(0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, 0x0, &(0x7f0000000100)) ioctl$sock_SIOCADDDLCI(r1, 0x8980, 0x0) [ 1862.093486][T14106] bond0: Releasing backup interface bond_slave_1 23:49:17 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x400021020017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x0, 0x0, 0x0) r1 = dup(r0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 23:49:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/wireless\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1c2, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) [ 1862.293190][T14188] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:19 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x4, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:19 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x6) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x600, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) gettid() ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = dup2(r1, r1) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000000)=r3) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000000000008970ff000000004700000000000000996d3423000077b71779fb37735c1fcf100537f9376f496717cf5ab35fc58420b98316e33df01d"], 0x3e) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 23:49:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xe12c, 0x800) perf_event_open(&(0x7f0000000300)={0x3, 0x70, 0x4, 0x1, 0xeb9, 0x8000, 0x0, 0x4, 0x2, 0x0, 0x9, 0x6c, 0x8, 0x8, 0x3, 0x8, 0x6, 0x10001, 0x10000, 0x4, 0x10000, 0x3, 0x9, 0x0, 0x2, 0x0, 0x3, 0xffffffff, 0x23d, 0x3ff, 0x17a, 0x100000001, 0x9, 0x2, 0x9, 0x1f, 0x3, 0x63, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000002c0), 0x1}, 0x4, 0xffffffff, 0x7fff, 0xe, 0x1, 0x8001, 0xfff}, 0x0, 0xf, 0xffffffffffffff9c, 0x3) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000040), 0xfffffffffffffe56) r3 = gettid() pselect6(0xfffffffffffffd9e, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = dup3(r0, r1, 0x80000) openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x200080, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x8) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) ioctl$VIDIOC_G_AUDOUT(r5, 0x80345631, &(0x7f0000000080)) tkill(r3, 0x5) ioctl$VIDIOC_G_FMT(r5, 0xc0d05604, &(0x7f0000000140)={0x1, @raw_data="83d3d4211981dd333f4ebcd67d0e82491df769dc9788f31fbb394cdfad54fec0237cce21230154feff7ccfc8aa22853d7b584fa574d8197d6d0ca4606f772ee04473efe3a8cff7c90ec7fb0d1023a48770148d47bf7094f95738d0debb9bcca23bda4ec136a492da1cecb8e802e8e61493e065603d1a142a8d037ef5603d6eb761ca75d065ac795220e427fbe0b16525801fe61f3c12f190c90a0810cf01aba5dadc38d0eaac164d6b4497e73dddc8c16f5872d7261ef514b4a1537e31eeffe0c3e5b9a6210fc1bb"}) ioctl$KDDELIO(r5, 0x4b35, 0x0) ptrace$cont(0x18, r3, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) prctl$PR_GET_SECUREBITS(0x1b) ptrace$cont(0x1f, r3, 0x0, 0x0) 23:49:19 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/wireless\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1c2, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 23:49:19 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x2) 23:49:20 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0xfffffffffffffffd, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) tkill(r3, 0x1000000000016) [ 1865.113484][T14261] bond0: Releasing backup interface bond_slave_1 [ 1865.274498][T14269] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:20 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x3, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f00000001c0)={0x1b}, 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ptrace$getregset(0x4204, r5, 0x205, &(0x7f0000000000)={&(0x7f0000000100)=""/145, 0x91}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="737b7a31af834fe6e3feca3b435bb534792b558758cfdff778e443ba63ea1513b30f6a33c1b4551c3f07ea05b7"], 0x4) 23:49:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/wireless\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1c2, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 23:49:20 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0xffffffffffffffff) sched_setattr(r2, &(0x7f0000000180)={0x30, 0x1, 0x0, 0x20, 0x0, 0x9, 0xffffffff, 0x6}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x100, 0x0) connect$bt_sco(r3, &(0x7f0000000140)={0x1f, {0x6, 0xffffffffffffffff, 0x5, 0x3, 0x1f, 0x3}}, 0x8) ppoll(&(0x7f00000001c0)=[{r0, 0x2000}, {r3}, {r0, 0x40}], 0x3, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240)={0x3}, 0xfffffffffffffe5e) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x400, 0x0) get_mempolicy(&(0x7f0000000000), &(0x7f0000000040), 0xbc, &(0x7f0000ffa000/0x4000)=nil, 0x0) tkill(r4, 0x5) ptrace$cont(0x18, r4, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r4, 0x0, 0x0) 23:49:20 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x6) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x600, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) gettid() ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f0000000080)) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) r3 = dup2(r1, r1) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000000)=r3) write$P9_RLERRORu(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="06000000000000008970ff000000004700000000000000996d3423000077b71779fb37735c1fcf100537f9376f496717cf5ab35fc58420b98316e33df01d"], 0x3e) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs(0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) 23:49:20 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1865.600844][T14449] bond0: Releasing backup interface bond_slave_1 [ 1865.740515][T14502] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000040)={0x323, 0x8, 0x3, 0x7fff, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r3, 0x1}, &(0x7f0000000180)=0x8) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:20 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000340)='net/wireless\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, &(0x7f0000000580)=[{0x0}], 0x1}}], 0x1c2, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1a1, 0x0) 23:49:20 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$uinput_user_dev(r0, &(0x7f00000001c0)={'syz1\x00'}, 0x45c) 23:49:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000080)={0x9, 0x8, r1, 0x0, r3, 0x0, 0x4, 0x4}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1865.979353][T14522] bond0: Releasing backup interface bond_slave_1 [ 1866.099321][T14529] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:21 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x80000000, 0x7fffffff}, {0x9, 0x2}]}, 0x14, 0x1) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:23 executing program 0: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmmsg(r0, &(0x7f0000003dc0)=[{{&(0x7f00000037c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0, 0x0, &(0x7f0000003d80)=[{0x38, 0x109, 0x79ffa649, "1f3ab2b8fb9e1873859ea6d16caa8b2fa0c9101b24ea80a66c57fb678715f36473202ca0"}], 0x38}, 0x5}], 0x1, 0x8080) 23:49:23 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) pipe2$9p(&(0x7f0000000000), 0x4000) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) fchdir(r1) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:23 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2d012e2f66696c65207263d6b945241211d52c06266a6435ed99de23e377918f728c24f8c921748d9ba7585343faad0d213ff55fadee4f0d67341f567d2e6f9c4084daa44163c87aaa7b37b6dbc3c5753e428b4437302a0716a44309a2ef411e620558116cb579d5575150aefb9e5e3c87aec3c21ec74f0ce9087fc0c04fc023e4b5704d9bcf55d053c32d55e5f57bad79ba3ae0479f939f6fd2ab3d0173957674020094c5947d230baeb2db514f432a4b973132905e3893b382d9bb6598c3"], 0x1) 23:49:23 executing program 0: shmget$private(0x0, 0x4000, 0x0, &(0x7f0000d0f000/0x4000)=nil) munmap(&(0x7f0000d0d000/0x9000)=nil, 0x9000) shmat(0x0, &(0x7f0000d0f000/0x6000)=nil, 0x0) mlock(&(0x7f0000d0f000/0x1000)=nil, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r0, 0x4, 0x8c) pwritev(r0, &(0x7f0000000080), 0x8b, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) unlink(&(0x7f00000000c0)='./file0\x00') bind(r1, &(0x7f0000000080)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, 0x0, 0x0) unlink(&(0x7f0000000000)='./file1\x00') 23:49:23 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr(r0, &(0x7f0000000100)=@random={'os2.', '/bdev\x00'}, 0x0, 0x0, 0x0) [ 1868.493754][T14555] bond0: Releasing backup interface bond_slave_1 23:49:23 executing program 3: perf_event_open(&(0x7f0000000540)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000000040)=0x3a04a497, 0x4) recvmmsg(r0, &(0x7f0000000200), 0x329, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 23:49:23 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) gettid() lstat(&(0x7f0000000e40)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000c40)) geteuid() sendmsg$netlink(r2, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xc) lstat(0x0, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 23:49:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) socket$can_raw(0x1d, 0x3, 0x1) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1868.694554][T14566] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:23 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x200, 0xc0080) ptrace$pokeuser(0x6, r1, 0x3d, 0x3) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x401, 0x2, 0x700f, 0x7, 0x5, 0x0, 0x2, 0x3}}) pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x2, 0x1, [0x80000001]}, &(0x7f0000000180)=0xa) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0x40, 0xff, 0x9, 0x6, 0xd8c, 0x0, 0x100000000, 0x6, 0x0}, &(0x7f0000000200)=0x20) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000240)={r3, 0x6, 0x101, 0x100, 0x7, 0xd918, 0x2, 0x1, {r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0xfff, 0x2, 0x2b, 0x3}}, &(0x7f0000000300)=0xb0) write$P9_RRENAMEAT(r2, &(0x7f0000000380)={0x7, 0x4b, 0x2}, 0x7) prctl$PR_SET_FPEMU(0xa, 0x2) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f00000003c0)={0x4, 0xff}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) pipe2$9p(&(0x7f0000000340), 0x800) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1868.992276][T14789] bond0: Releasing backup interface bond_slave_1 [ 1869.110305][T14793] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x101000) sendmsg$tipc(r2, &(0x7f0000000240)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x1, {0x41, 0x0, 0x2}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000100)="49266497bd992520a6cd3698753afb79201d93200cf8b0e8e5702325f390d06f916cfe5ea488a93e4f2938a933cc00f6cb5bb4b0e5d62ec2dd613066d44d737ffb0e5bcaa3e354bdab7b734c15b327412c5fb1e97d2e600c74c25af7821d721faa49ab5ff6bf80b969323875a88bbb24df6b", 0x72}], 0x1, &(0x7f00000001c0)="0b433f7b8a48618c26302f0367aa9d607fb16183f4b109bd4154a7531d2212c7bcf597520fe4866cf45078407b561af084f118750a5bec6db7aeb9933fbff942b39e", 0x42, 0x40}, 0x24000040) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:24 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) gettid() lstat(&(0x7f0000000e40)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000c40)) geteuid() sendmsg$netlink(r2, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xc) lstat(0x0, &(0x7f0000000480)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fcntl$getown(0xffffffffffffffff, 0x9) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 23:49:24 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x7, 0x80) connect$llc(r3, &(0x7f0000000080)={0x1a, 0x337, 0xfff, 0x1, 0x8, 0x1, @remote}, 0x10) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000040)={0xfffffffffffffff9, 0x7fffffff}) tkill(r2, 0x5) ptrace$cont(0x3f, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, r2}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000140)={0x74, 0x0, [0x2, 0x9, 0x0, 0x10000]}) ptrace$cont(0x1f, r2, 0x0, 0x0) 23:49:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1869.305039][T14808] bond0: Releasing backup interface bond_slave_1 23:49:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) setregid(r2, r3) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1869.537309][T14815] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:24 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1869.689669][T14829] bond0: Releasing backup interface bond_slave_1 23:49:24 executing program 3: r0 = creat(&(0x7f0000000400)='./file0\x00', 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/full\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000300)) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, &(0x7f00000003c0)) gettid() lstat(&(0x7f0000000e40)='./file0\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000c00)) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000c40)) geteuid() sendmsg$netlink(r2, &(0x7f0000000e00)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000e80)=ANY=[@ANYBLOB="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"], 0x1}], 0x1}, 0x0) getpeername$packet(r0, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000680)="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") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000540)=0xc) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000001ac0)) fcntl$getown(r2, 0x9) 23:49:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x4000000000006, 0x0, 0x0, 0xffffffff}]}) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1869.856512][ T26] audit: type=1326 audit(1551138564.716:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14837 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 [ 1869.889574][T14832] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1870.570274][ T26] audit: type=1326 audit(1551138565.426:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=14837 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ac8a code=0xffff0000 23:49:26 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100, 0x40000) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f0000000040)={0x7, 0x2, 0xbd03, 0x89}) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() ioctl$BLKRAGET(r4, 0x1263, &(0x7f00000001c0)) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) tkill(r6, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8d6a778d3c2e2e9da5de3c34c6c471abbaa96734227c4632746648f0090d671b0919feed315d344038d2dc1b0c5d08ffa5bd7d42e70d06977bda2e30836409c19335a37eb2375cb78606598fc00524afe13e936473e93bb82870f5c72dab08ee9135287a3ce086db3c822adebf628ec501a96e4b7c3037a0a26bac1a95f7963c23c18a574b4a1352e54c58bd"], 0x4) 23:49:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x20000) ioctl$VIDIOC_S_DV_TIMINGS(r2, 0xc0845657, &(0x7f0000000140)={0x0, @reserved}) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:49:26 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c491"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:26 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:26 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='com.apple.FinderInfo\x00') ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000100)) 23:49:26 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:26 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x40) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000180)) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x1000000014, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x20, 0x420502) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="48010040", @ANYRES16=r4, @ANYBLOB="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"], 0x148}, 0x1, 0x0, 0x0, 0x4040000}, 0x44000) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1871.862180][T14969] bond0: Releasing backup interface bond_slave_1 [ 1871.949451][T14964] bond0: Releasing backup interface bond_slave_1 [ 1872.613606][T14958] cgroup: fork rejected by pids controller in /syz4 [ 1872.674252][T14968] bond0: Releasing backup interface bond_slave_1 23:49:27 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1872.829412][T15036] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1872.840086][T15074] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1872.856553][T15080] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:27 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c491"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:27 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:27 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1872.997677][T15096] bond0: Releasing backup interface bond_slave_1 [ 1873.810346][T15103] bond0: Releasing backup interface bond_slave_1 [ 1873.849124][T15101] bond0: Releasing backup interface bond_slave_1 23:49:28 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1874.016047][T15105] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.025620][T15104] bond0: Releasing backup interface bond_slave_1 [ 1874.200013][T15106] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.210799][T15107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.227609][T15109] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1874.271619][T15115] bond0: Releasing backup interface bond_slave_1 23:49:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) getpgid(r2) 23:49:29 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c491"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:29 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:29 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="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"], 0x32c}, 0x1, 0x0, 0x0, 0x20004000}, 0x8000) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00000004c0)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:29 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1875.038200][T15116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1875.057330][T15123] bond0: Releasing backup interface bond_slave_1 23:49:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000100)={0x9, 0x0, [{0x10000, 0x0, 0x400}, {0x3, 0x0, 0x7ff}, {0xfff, 0x0, 0x4}, {0x101, 0x0, 0x944c}, {0x4, 0x0, 0x18}, {0x401, 0x0, 0x9}, {0x6, 0x0, 0x635}, {0x0, 0x0, 0x6}, {0x78b4, 0x0, 0x2}]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r6, 0x1000000000016) [ 1875.744131][T15127] bond0: Releasing backup interface bond_slave_1 [ 1875.802647][T15126] bond0: Releasing backup interface bond_slave_1 23:49:30 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e6"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:30 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1875.960406][T15135] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1875.972903][T15138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1875.993277][T15178] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:30 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1876.025689][T15244] bond0: Releasing backup interface bond_slave_1 23:49:31 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1876.254586][T15245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1876.272670][T15258] bond0: Releasing backup interface bond_slave_1 23:49:31 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e6"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1876.374590][T15262] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1876.391701][T15260] bond0: Releasing backup interface bond_slave_1 [ 1877.000863][T15264] bond0: Releasing backup interface bond_slave_1 [ 1877.175853][T15266] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1877.186756][T15267] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1877.196517][T15272] bond0: Releasing backup interface bond_slave_1 [ 1877.361353][T15273] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1877.371637][T15276] bond0: Releasing backup interface bond_slave_1 [ 1877.428832][T15278] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:32 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) ioctl$sock_rose_SIOCDELRT(r2, 0x890c, &(0x7f0000000240)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x3, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @default, @default]}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) clock_gettime(0x3, &(0x7f0000000040)) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f0000000100)=ANY=[@ANYBLOB="5175ffff980000003b437ab94f95c9b2d6f37ff0585689bc4686fee231bdc5b706c2bc6797ace95c0613e9b60620ffe30c4729db8341649942c72924e71f83713d5a1e82d062b71730baf6b60aa348e0f5cbcfda62cbf71ecec57b35c543e0b721febeb66e59cf9c8e830665cc548e3da35f1f52b6f914c7d8e5304d00e57f6f3c54bc0599dc970b4c6fe8dffd4a92615be0f7a348375d84fe2fcaa64f97b21e"]) 23:49:32 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e6"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:32 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:32 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:32 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e6"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1878.032070][T15288] bond0: Releasing backup interface bond_slave_1 [ 1878.118688][T15293] bond0: Releasing backup interface bond_slave_1 23:49:33 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) sendto$isdn(r2, &(0x7f0000000000)={0x80000000, 0x81, "a849818bfe1797411cd0d0293781b20c209d4869e6bb747d4dd3e5d98ca571d37308d6d469b472b0a9cd07f206fb349b8aa8d96da81d837db339ab8e4bb23e3d47e38f56b573446011eb2b60de834967464be959"}, 0x5c, 0x4004804, &(0x7f0000000100)={0x22, 0xffffffffffff28bd, 0x8000, 0x68, 0x4}, 0x6) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) [ 1878.922616][T15292] bond0: Releasing backup interface bond_slave_1 [ 1879.090648][T15291] bond0: Releasing backup interface bond_slave_1 [ 1879.251767][T15296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1879.268036][T15398] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1879.283418][T15399] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:34 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e600"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:34 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e6"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000100)={0x9, 0x0, [{0x10000, 0x0, 0x400}, {0x3, 0x0, 0x7ff}, {0xfff, 0x0, 0x4}, {0x101, 0x0, 0x944c}, {0x4, 0x0, 0x18}, {0x401, 0x0, 0x9}, {0x6, 0x0, 0x635}, {0x0, 0x0, 0x6}, {0x78b4, 0x0, 0x2}]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r6, 0x1000000000016) [ 1879.295063][T15396] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:34 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c8"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1879.440443][T15416] bond0: Releasing backup interface bond_slave_1 [ 1879.502255][T15413] bond0: Releasing backup interface bond_slave_1 [ 1880.250619][T15421] bond0: Releasing backup interface bond_slave_1 23:49:35 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e600"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:35 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e600"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1880.415552][T15422] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1880.426413][T15424] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1880.438147][T15423] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1880.561098][T15434] bond0: Releasing backup interface bond_slave_1 23:49:35 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x10000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x406, r0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r4, 0x604, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}}, 0x200008d0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_SET_GS(0x1001, 0x7) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4180) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) tkill(r6, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="73f17a35"], 0x4) ioctl$KVM_SET_TSS_ADDR(r5, 0xae47, 0xd000) 23:49:35 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e6"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r3, &(0x7f0000000180)="41f1505c78aa3298889ce5ae6f42cd4f772fd3bdf18895f552fd846abf1d0f3366aff0fec1255619e75365e38d96013c5034ac3a5f3648f5558795c4489e51c275", &(0x7f0000000240)=""/202}, 0x18) userfaultfd(0x80800) setitimer(0x0, &(0x7f0000000100)={{r6, r7/1000+30000}, {0x0, 0x7530}}, &(0x7f0000000140)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{}, {0x77359400}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:36 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x6, 0x218001) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x2, &(0x7f0000000040)={r8, r9+30000000}) [ 1881.476307][T15436] bond0: Releasing backup interface bond_slave_1 23:49:36 executing program 5: socketpair$unix(0x1, 0x401, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1881.523166][T15437] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1881.540517][T15438] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1881.572978][T15444] bond0: Releasing backup interface bond_slave_1 23:49:36 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'L+', 0x4}, 0x28, 0x0) 23:49:36 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e600"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:36 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e600"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1882.037610][T15486] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1882.054415][T15870] bond0: Releasing backup interface bond_slave_1 [ 1882.124532][T15867] bond0: Releasing backup interface bond_slave_1 23:49:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000100)={0x9, 0x0, [{0x10000, 0x0, 0x400}, {0x3, 0x0, 0x7ff}, {0xfff, 0x0, 0x4}, {0x101, 0x0, 0x944c}, {0x4, 0x0, 0x18}, {0x401, 0x0, 0x9}, {0x6, 0x0, 0x635}, {0x0, 0x0, 0x6}, {0x78b4, 0x0, 0x2}]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r6, 0x1000000000016) 23:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4208, r2, 0x2, 0x20) init_module(&(0x7f0000000380)='syz1\x00', 0x5, &(0x7f00000003c0)='syz1') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) shmget(0x3, 0xa000, 0x1000, &(0x7f0000ff4000/0xa000)=nil) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000480)={0x2, 0x70, 0x666b, 0x46d466f9, 0x40, 0x5, 0x0, 0xb8aa, 0x4, 0x4, 0x3, 0x80000001, 0xffffffff, 0x7, 0xfffffffffffffffd, 0x81, 0x7f, 0xf8ef, 0x5, 0x0, 0xfffffffffffffc01, 0x9, 0x5, 0x2, 0x20, 0x3, 0x80000000, 0x81fd, 0x1ff, 0x0, 0x10001, 0x9, 0x8, 0x6, 0x7, 0x2d96, 0x6, 0xfffffffffffffff8, 0x0, 0xfffffffffffffffb, 0x6, @perf_config_ext={0x7, 0x3}, 0x500, 0x9, 0x0, 0x7, 0x4, 0xfffffffffffffc01, 0x9}) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x28, r8, 0x4, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x200000c0}, 0x20000000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e20, 0x8, @loopback, 0xffff}}, 0x1ff, 0x9}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000040)={r9, 0x2, 0x5, 0x5}, &(0x7f00000001c0)=0x10) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) sched_setparam(r5, &(0x7f0000000500)=0x5b9) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080), 0x13f, 0xb}}, 0x20) 23:49:37 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:37 executing program 5: socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x3, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f0000000240)}}, 0x10) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000100)={'syz1', "ecc7ddf9f0b5a1e83839377c9b3abe8a95766a61c3dd8e4f61b2cc915f7d775269706442b898b744176ed504cf2c14312f2b4ef599f7566832558097f77de6b7a7a8719872e1fdc2c7a4282aa34c374c7bb9a2e089cc786c5cc0f484b4734bb684302fd132d84aff3e15022b90c594da618b1938eb687dc774831fc24ffd2017e8f0397f819442c958f9b920e44ef33f516967a36e1734d4e44ad5f0448aaee7645c471de670bb0d53e95875ca02c20be87bb41e962a7ffdf88e0d5ccc59b38c4bffa794ad31059ae58f482935674368070240b525d55e3ff212579ef785663569f8e54a"}, 0xe8) socket$netlink(0x10, 0x3, 0x1e) 23:49:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x4604, 0x20, 0x42, 0x69}, &(0x7f0000000040)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000200)=ANY=[@ANYRES32=r3, @ANYBLOB="98d1e6005a63a87d635e5c7c0eb5df15fbdc0c683f96e94437be325288f32aa6e4b957b9d0b8d10c55398f3c64f922615575d338d6480ea8e82e8d6e0b5dcb758cb68a23b12566db8fa973c158726b03e98007288c825544f6c611d919b119fc6544b775ade61064bf23dd228b823a8adc8271383dcc8356e76e287ab8da451e6c0b17db03b33ca919a672fb4782d2b6172635a6a5c17c91d4689dc1900a22e20d15f76e3c7b20ca20ba36f1b3302efbf090cb247b436089f2e6d0e2f3e38e9977c44f4c7d7ec3c5feb6a160fe2f4933b3de8c9a0f4870d3593cc8c56a855ecf6c6f105ab7d7548e7d18b9695ba48b046581"], 0xee) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r2, &(0x7f0000000200)={'sy~1'}, 0x4) [ 1882.840433][T15874] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1882.863866][T15875] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:37 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:37 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e600"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1882.903604][T15880] bond0: Releasing backup interface bond_slave_1 23:49:37 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:37 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040), &(0x7f0000000180)=0x4) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) ioctl$KVM_X86_SET_MCE(r3, 0x4040ae9e, &(0x7f0000000000)={0x8800000000000000, 0x3000, 0x3e, 0x5, 0xa4}) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="73797a31657686c78daa64984f83c9af413df614116f5289b5a6159ad9992875d08ff10969ab32512c52ffeb97aab028e58c88384caf34781f2a9436da093524573bd7a8787b292bc961879dd943a4e3665af41c53ef8b1bd1e6c822a691cd8879db8dc3e57198252b855a04cf3b"], 0x4) 23:49:38 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r4, r5+10000000}}, 0x0) tkill(r3, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:38 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1883.400545][T15985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1883.418771][T16130] bond0: Releasing backup interface bond_slave_1 [ 1884.009762][T16129] bond0: Releasing backup interface bond_slave_1 [ 1884.070198][T16222] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1884.084224][T16223] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1884.104346][T16403] bond0: Releasing backup interface bond_slave_1 [ 1884.393042][T16440] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000100)={0x9, 0x0, [{0x10000, 0x0, 0x400}, {0x3, 0x0, 0x7ff}, {0xfff, 0x0, 0x4}, {0x101, 0x0, 0x944c}, {0x4, 0x0, 0x18}, {0x401, 0x0, 0x9}, {0x6, 0x0, 0x635}, {0x0, 0x0, 0x6}, {0x78b4, 0x0, 0x2}]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r6, 0x1000000000016) 23:49:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000600)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000100), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="325005dc3f72", @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x4}}}, {{@arp={@multicast1, @remote, 0xffffff00, 0x0, @mac=@remote, {[0x96b15326966f50d5, 0xff, 0xff, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0xff, 0xff]}, 0x376, 0x7fff, 0x4, 0x5, 0x5100000000000000, 0x8, 'veth1_to_hsr\x00', 'veth1_to_bond\x00', {0xff}}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x34}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @dev={0xac, 0x14, 0x14, 0x1c}, 0xf, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x10000, 0x0) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)=0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r1, 0x10, &(0x7f0000000240)={&(0x7f0000000140)=""/210, 0xd2}}, 0x10) timer_settime(r5, 0x1, &(0x7f00000002c0)={{}, {0x0, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x0) 23:49:40 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:40 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:40 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000066e2cff924fa0b12809f92812661cbcf88dc8b733eee220582a90ece199d3abded818c831c10af6bd32f87c06ad77a438ee63d5090ff270f52d6cab026e16b73184a39a3be5ecf9946f2dd6c652755f4038dd31d65386f7742a10d900934a39af9bcd6b38ee97a1f18739377ac08ed38405c4e87324b7a2537983319340cf76e9ea70ba2cb2177e208424c7dbd0123802ea45ac3080ce27f239551dad40941be052beda0d6c5ab22abdadd13dea3edac33b9d702a128251051d1d546e4c9bf8b657deec1a83d52984d2c35c1"], 0x4) [ 1885.607988][T16569] bond0: Releasing backup interface bond_slave_1 [ 1885.704347][T16559] bond0: Releasing backup interface bond_slave_1 23:49:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="73797a31f7e022f702a92e61a63980aa86f7d4f23f9b58ed10010b59016a6229cb3871772f00d9ce80"], 0x4) 23:49:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) r7 = semget(0x1, 0x2, 0x0) semctl$GETALL(r7, 0x0, 0xd, &(0x7f0000000000)=""/18) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) write$P9_RLERRORu(r3, &(0x7f0000000040)={0x11, 0x7, 0x2, {{0x4, 'syz1'}, 0x3f}}, 0x11) 23:49:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team_slave_1\x00', 0x800}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000040)) splice(r3, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e24, 0x6, @local, 0x6}}, [0x3, 0x21, 0xff, 0x8100000000, 0xffffffff, 0x9b, 0x8, 0x81, 0x7f, 0x1000, 0xace6, 0x1, 0x9, 0x8, 0x80]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000004c0)={0x7f, 0x4, 0x8, 0xff, 0x68, 0x6, 0x6, 0x9c1f, r7}, &(0x7f0000000500)=0x20) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) ptrace$setregset(0x4205, r4, 0x5, &(0x7f0000000180)={&(0x7f0000000100)="924226955d5e0ed247eb08111991f8cb303f46089695f170bca3df417ba1642f238cc925c53a1906a482224bd88afff20bdcb514a0893db2ecf7a31dbcbc8eb86c279b1bebf1437c34573b0543732c84a26c05db18b8b5c72cd2f3e05b50a36c335a2a99a3c398412e24b68e", 0x6c}) tkill(r4, 0x1000000000016) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x4) [ 1886.437151][T16557] bond0: Releasing backup interface bond_slave_1 [ 1886.587557][T16668] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1886.597899][T16671] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:41 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:41 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1886.628369][T16672] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1886.758822][T17097] bond0: Releasing backup interface bond_slave_1 [ 1886.839718][T17096] bond0: Releasing backup interface bond_slave_1 [ 1887.609432][T17098] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1887.622998][T17099] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000100)={0x9, 0x0, [{0x10000, 0x0, 0x400}, {0x3, 0x0, 0x7ff}, {0xfff, 0x0, 0x4}, {0x101, 0x0, 0x944c}, {0x4, 0x0, 0x18}, {0x401, 0x0, 0x9}, {0x6, 0x0, 0x635}, {0x0, 0x0, 0x6}, {0x78b4, 0x0, 0x2}]}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) 23:49:43 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = dup3(r1, r0, 0x80000) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000040)=0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x200040) timer_settime(0x0, 0x2, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:43 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:43 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0xaa000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_PIE_ON(r2, 0x7005) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() migrate_pages(r1, 0x3, &(0x7f0000000100)=0xfa00000000000000, &(0x7f0000000140)=0xf66) perf_event_open$cgroup(&(0x7f0000000000)={0x5, 0x70, 0x2, 0x4, 0x909, 0x10000, 0x0, 0x5, 0x8000, 0x8, 0x8, 0x4, 0x649ef4f8, 0x6, 0x9c13, 0x8, 0xfffffffffffff74c, 0x0, 0xff, 0x3, 0x7, 0x9, 0x40, 0x5, 0x4, 0x12, 0x7, 0xe, 0x8000000, 0xd60, 0x6, 0x9, 0x7, 0x9, 0x401, 0x2, 0x1, 0x13f0ed0a, 0x0, 0x2000000, 0x1, @perf_config_ext={0x9, 0x2}, 0x100, 0x100, 0x3f, 0x5, 0x10001, 0x8, 0x4}, r2, 0xffffffffffffffff, r3, 0x8) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) [ 1888.655056][T17108] bond0: Releasing backup interface bond_slave_1 23:49:43 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$KVM_SET_XCRS(r4, 0x4188aea7, &(0x7f0000000100)={0x9, 0x0, [{0x10000, 0x0, 0x400}, {0x3, 0x0, 0x7ff}, {0xfff, 0x0, 0x4}, {0x101, 0x0, 0x944c}, {0x4, 0x0, 0x18}, {0x401, 0x0, 0x9}, {0x6, 0x0, 0x635}, {0x0, 0x0, 0x6}, {0x78b4, 0x0, 0x2}]}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1888.756914][T17116] bond0: Releasing backup interface bond_slave_1 23:49:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) ioctl$VIDIOC_QUERYCTRL(r2, 0xc0445624, &(0x7f0000000240)={0x1, 0x8, "c89d47682fa0a96ef85882ee667e0a52d79f5cb7245587caa34608877d351ff6", 0x3, 0x100, 0x8, 0x100000000, 0x1a8}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(0x0, 0x1000000000016) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r5, 0x9, 0x7e}, 0x8) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000000)=0xe7, 0x4) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e00000037020003001001000000000000006f4acc1b0b35b80000000000000000d5404fbe8c77d307620440eb07da9aea368f7a4a3ec14a702e8cd47db1b92cce207f120b9e85b52ffa0d14d619960ef1b1ac24da28d64d7f5537226b922dade76ce497348c1caf8c6af958325801adc7abfd4418d5706dd961732ac5160bc76663f49c00000000000000000000", @ANYRES32, @ANYBLOB='\x00\x00'], 0x1e) fsetxattr$security_selinux(r3, &(0x7f00000001c0)='security.selinux\x00', &(0x7f0000000200)='system_u:object_r:random_device_t:s0\x00', 0x25, 0x1) [ 1889.514329][T17113] bond0: Releasing backup interface bond_slave_1 23:49:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1889.704101][T17120] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1889.717494][T17124] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:44 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1889.745121][T17122] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:44 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:44 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1889.842963][T17344] bond0: Releasing backup interface bond_slave_1 23:49:44 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1889.995221][T17349] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1890.012461][T17350] bond0: Releasing backup interface bond_slave_1 [ 1890.775945][T17354] bond0: Releasing backup interface bond_slave_1 [ 1890.939028][T17357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1890.949855][T17359] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1890.964954][T17364] bond0: Releasing backup interface bond_slave_1 [ 1891.009882][T17365] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:46 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:46 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:46 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1891.645009][T17380] bond0: Releasing backup interface bond_slave_1 [ 1891.722611][T17377] bond0: Releasing backup interface bond_slave_1 23:49:46 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, 0x0, 0x6, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000000)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000040)=0x24) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r3+10000000}}, 0x0) tkill(r2, 0x1000000000016) 23:49:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:46 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r6 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539f1", 0xc1, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)="17", 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r7, r6, r6}, &(0x7f0000000600)=""/243, 0x3e0, &(0x7f0000000080)={&(0x7f0000000180)={'crct10dif-generic\x00\x00\x00\x0f\x00'}}) r8 = gettid() ioctl$BLKTRACESTART(r3, 0x1274, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r9, r10+10000000}}, 0x0) tkill(r8, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='syz5'], 0x4) 23:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vfio/vfio\x00', 0x20000, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000340)={0x10000, 0x112000}) r3 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x27b0, 0xc002) ioctl$VIDIOC_G_FMT(r3, 0xc0d05604, &(0x7f0000000100)={0x1, @sdr={0x7757554d, 0xefb}}) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r6, 0x0, 0x6, 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000280)={[], 0x7, 0x3, 0x6, 0x1, 0x7, r4}) write$USERIO_CMD_SET_PORT_TYPE(r6, &(0x7f0000000380)={0x1, 0x6}, 0x2) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000240)=0x4) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r8, r9+10000000}}, 0x0) tkill(r7, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000000)={{0x1, 0x3, 0x80000001, 0x2, 0xffff}, 0x4, 0x1, 0xae73}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='syz3'], 0x4) 23:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000100)="125bd4845485dcb390e1af0996f5c399ef9c2caf424bb2b4c81857b0a93840f5138b38d4d98d9cdf67d1a6e28d051cf3c8eaf0a459a1fd8b2d67cdb93faec10c05f75a20942af6346c5ca70f9d878f947dcc9842ebd82392e249b1", 0x5b, r5) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="73797a3167dd7231e7eeedba0ce69f13e565a39133b98308a1b107408cbd8a32a83a1dfbc7d190d8dc7349aa06118a2e5cf922068f2806253470c6ea6794be3aef174b1383a350501c82ccc0dde0ff642e77ac02ffb5d000810bf9df2bb67d516a84a740f876f1a6e5b3755f9560c291d1e3a23bd302b747a32a13"], 0x4) [ 1892.561026][T17379] bond0: Releasing backup interface bond_slave_1 23:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1892.768788][T17389] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1892.790108][T17413] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:47 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1892.814618][T17435] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:47 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:47 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:47 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x440000, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f0000000040)={0x5, [0x7, 0x3, 0x80, 0x81, 0x8089]}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x8, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) tkill(r4, 0x1000000000016) [ 1892.957515][T18292] bond0: Releasing backup interface bond_slave_1 23:49:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_CHECK_EXTENSION_VM(r3, 0xae03, 0x431e) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) ptrace$getsig(0x4202, r2, 0x2, &(0x7f0000000100)) tkill(0x0, 0x1000000000016) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="7301003131f056b26efa386b586de19b45fdec7aec178fb6518f8e3d4e2ce1e7fd8862665aa2ca7aa1815fbbd86d5dc73d9043debf2cc12c70004396d06f89a1b19a75079826fab2bb66b7"], 0x4) [ 1893.058917][T18308] bond0: Releasing backup interface bond_slave_1 23:49:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) gettid() timer_create(0xfffffffffffffffe, &(0x7f0000000100)={0x0, 0x12, 0x4, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r3+10000000}}, 0x0) tkill(r1, 0x1000000000016) ptrace$setregs(0xf, r1, 0xfffffffffffffffa, &(0x7f0000000000)="fba7c7654ee4a738237120aaad8ad0c58a3be6c326b8fdd5621d6cabd4a9e63b668996badba784c78cb48c6317c47de183de") 23:49:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) kcmp$KCMP_EPOLL_TFD(r5, r2, 0x7, r3, &(0x7f00000001c0)={r4, r0, 0x20}) clock_gettime(0x0, &(0x7f0000000080)) timer_settime(0x0, 0x21, &(0x7f0000000040)={{0x0, 0x8}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="73797a3181aa9fc79282084385799aebf0de236f8dfe4d99c4a38d4d4508123da34b8e8b81d0b06ed7ab13ba56618ad995a3d52518e054b49f11c9c346522c9563d9be862ea92545ab9d70b67cb3150f3fe27cbf6e0c0b2558c061c1c78b0ae21fa3239dc6eca4b107e84c1dd9f8c3d815da41197730c787d1ff55a39ef650d814468937b6b84e83315f55060ff7ba928c60934c94fa0af7cf9d2a041a"], 0x4) fsetxattr$security_ima(r4, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000100)=@v2={0x3, 0x1, 0x3, 0x7, 0x8a, "1669cdb06badaec23b656b5a1d1734a43694e3d0c523db510ced0f31685de13b92ab9cc9b50e4a181252fc56c0e698c1e46307388d00c3e6e6659bcbb670817507abc942e58a61de7c9479fffdf0727386c8414456a1cbf6c51fffa806eb1c1e0189d128c81c7566fd5329c7eaea4a70af9d5d03b47bdcd8f44de83434933c22889d77930746a2abaa0a"}, 0x94, 0x1) 23:49:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0xffffffffffffffff) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000140)=0x101, 0x4) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x4) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r2, 0xc0305602, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x1}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) tkill(r1, 0xd) 23:49:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x7b9, 0x509040) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x3) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETLED(r3, 0x4b31, &(0x7f0000000040)) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) write$P9_RXATTRCREATE(r5, &(0x7f0000000240)={0x7, 0x21, 0x1}, 0x7) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x3, 0x6, 0x6, 0x6, 0x0, 0x6, 0x0, 0x8, 0x5, 0x7fffffff, 0x8, 0xf5d, 0x200, 0x1, 0x66b570a0, 0x1f, 0x0, 0x9, 0x3, 0x9, 0x7c, 0x5, 0x3, 0x0, 0x9, 0x95fb, 0x3, 0x9, 0x400, 0x2, 0x0, 0x80000000, 0x1, 0x1000, 0x5, 0xffffffff80000001, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x7, 0x0, 0x7, 0x1000, 0x3f}, 0x0, 0x2, r4, 0x0) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000001c0)={0x1, @multicast1, 0x4e21, 0x3, 'ovf\x00', 0x4, 0x8, 0x65}, 0x2c) tkill(r6, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:48 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1893.881405][T18338] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1893.891014][T18336] bond0: Releasing backup interface bond_slave_1 23:49:48 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:48 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x408100, 0x0) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000040)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x4) 23:49:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x1000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x7, 0x101000) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000040)=""/43) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:48 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r0, 0x0, 0x0) pipe(&(0x7f00000000c0)) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1894.060125][T18357] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1894.070746][T18384] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1894.080547][T19180] bond0: Releasing backup interface bond_slave_1 [ 1894.184469][T19181] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:49 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1894.310448][T19193] bond0: Releasing backup interface bond_slave_1 23:49:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x2, 0x7, 0x7, 0x40, 0x0, 0x4, 0x8000, 0x4, 0x20, 0x40, 0x0, 0x10000, 0xd92, 0x4, 0xffffffffffffffe1, 0x10001, 0x3, 0x9, 0x0, 0x7fff, 0x800, 0xa4, 0x41, 0x8, 0x80, 0xc10, 0x401, 0xf4, 0x0, 0x5, 0x1, 0x2f60, 0xffffffffffffff31, 0x10000, 0x4, 0x3, 0x0, 0xb7, 0x5, @perf_config_ext={0x9, 0x2}, 0x2c00, 0xfffffffffffffffd, 0x93, 0x7, 0x3f, 0x7, 0x5c}, r2, 0xf, r3, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0xfffffffffffffffe, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:49 executing program 4: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x7f, 0x40000) write$FUSE_STATFS(r0, &(0x7f0000000100)={0x60, 0xfffffffffffffffe, 0x3, {{0x8, 0xffffffffffffffff, 0xffffffffffffff01, 0x8, 0x2, 0x100, 0x1, 0x7}}}, 0x60) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) openat$cgroup_type(r3, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) tkill(r5, 0x1000000000016) 23:49:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x1000c00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() sendmsg(r1, &(0x7f0000002840)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="7c8ef245f1c69f1d7f4f461b441b027370ee3ccbaa9fb5f12069fcaf98d1504b1979746f821a0fb3b64bf4dfd2265344f477a9a6c5e2d984462da1915d7d04749bdd9421c9", 0x45}, {&(0x7f0000000100)="d0f10c7f212ba15b28f8d1ee55511cca987e4a723cc45c4d08d30c682043da46832d23c20895820e7895d81791dbb86f5ba9991bdd635ea065502ec815dbc6b95ec659397307f81b0204edc9b88f1d714f", 0x51}, {&(0x7f0000000240)="e0f17d9cc63a549b622533539eadd236f65ad56ad818f80277c0ca56a9f801984b0c9cbe597b98881ccaf8b48cd61fbdd6d3c422c241c09c5140925e3987ff45602ae256f809f579f420e3e9b9725e7424a4f12d64a29e1501561f2018906ae54ba1ab3f19d632972ec2b7133f5c46558dc322f8e904d44ce0fd18d611c631b1a994373cfc93534001257457ea41016b2cbd5157bb44dade4249f73f43846fd78451baa6be5fac425d482707946cf86281ec16e16c44de409749614aed031c25f9799353337109b4d57eb3a09bec03f01633cec994279c6ea203", 0xda}, {&(0x7f0000000340)="f54863df22437841349597285a23dd9d9eb2b698624a7f4ec722d5b52faa8627ee909ec9f705c591ecc6c5f9ff68bdb9e9c66ce29281a1373ac544222b2a61328be9dcd4b900e30ee4f6fb50e71eacf62df6a308a4ff6074ba039405b025c3d6b0f77dedc00f44fbaa276d343a7b0c6afd771ac8a5c801c9b68324c730f40c2bf60f6703b170d3d42aea9c02ea8aef5f1028d4ac0516870a689b5aa31e45fba67e9e6104724f8a66a2f899efc69351b9bcf25c59b8f36376db031579", 0xbc}, {&(0x7f0000000400)="6a895553646e9ed0c3f02c4a54cc5edbe55556118d0272c6d9ebb073854f25c97ff707b241c23192705e89d0063666e09a331e6040fcec03426f3cb3548a70d409979b9cc2667fe74309961f88b2b67ad4b1d51b89326738f0ebda5b7901df6a0a3e3010339dd6e55de3e8eb1afe817b77346db2ca6b532ebe62da1b1716c9013c045c02313fe08a7544a2e587fc71ad8e554ef27257c77879e6fc87d709567a569049d406674464b0a2831970cb6a838a30ea6a84e6db1248e874e0fd51accbb5a7d7570b46428f3c1e52e54afa8392b9fd2c06c1d81b49eccc2c625ccd4134e861a974e049c37003", 0xe9}, {&(0x7f0000000500)="259bd3d2d1c53b7434c99511cc263f4ad98224ccd9b90153863b0feb6d6b55f8365c0f5d5cc8fd7af8569b037262052ea074ed776b503aa2b339428c9c0c82df353c636525c54d947663bb1b9645ab6acd1f0d78a7cce5c8f47838e99795b03ed9c9e15a150b02c85914bd3a2c1ee8d96880f1f9fe43895a6c44d925979c2e38a3a10973d703a1b1fc497f432a3b2380357b496f7e9459672c5dbe869fc717b09acbb665ee3ff57236ff0975b211b245e94b852ea3d7b9", 0xb7}, {&(0x7f0000000600)="d009ad0f7d24e2fbe7f3180846e23651e6922bd37738491a5191721bcfb3628aac6cfe0eae6edf660f65b57b14baea8ce879c901627511745cb51ea2da00bfc1bb292de2c87d497a793761de04b218e0aa372b0736f5684a5fa982c9422935440d90bcf3947484558f8fca50d3c9f84f3dd9a2f0901c282a683b536b30012b682a702d5cfe08192b634d879424e7a8c9c14cf4376625fe7b3809e3c4275107c5ee21bd8ede9b306071c73499283e80e8dbaec49bab29", 0xb6}], 0x7, &(0x7f00000006c0)=[{0x98, 0x1, 0x4, "2a59683ca6c75bd74f5455165cde0ab211480fb388c96a896adfb6e2742edcf0a2b30b2ab79c5ce3a39df49963186101f5dc7a6c3a0a9fc0fd8adbb7d9b5e64c7e48313bf79fc559df78f243607ceec0f4886af726c165f23249197a7f0d36447514be9236cb95c9c6e0cd991fb5b86acfd92ac684a9684b69117e45faca175dbd"}, {0x1010, 0x11f, 0x1, "58873a35102a69a0869ff4cfc8aab30a195d445bd9ae21a7c0d2cdeada6c34c60f1056557831d392c530204436a1a8de103bde79f8f5d6da16abbd22398071f1d947b2163d5abe5ad55a5f4bae310805306b3ac5eee4ef8bc1d14d0ace1e395b1a9cd7ba47fdd9b71d552d4a8036ecaf7a90d3481a1a93e18675da0f15e1e456bed2fb57e3308709b1943ec7288af708509f6aa6be942745f0eb2e904fb7732d462f4972354d1dd949c41403af8865e9119c01f896a51a53361c64b4cc005335cc97f0126a67229abce999c39d68d25f8739a2865c22c00e982f343cf5d4fb16c3ff50617f9995f40d7f3a145d1f47f9f6de3c5731e789c4913b0e578b5e84b5440340c96e70b1d035f7b0c5c2c49aa9032890e7448d4e4c9b6d930dd80e8de95b00f0702e51e66bc212643f05a9209750bb7d5464279fb2f9d495d5c04b5c926bf8b5a77a5a6ae74f7360dcc5148031b39570dff805d708d44f92c02ab2e320e5dba365cd25da57d6217bd0d310486ea0282d93aedc725d0cace4f79b5400e5feb76a7639aa36bb0cefb12d7a45e210bfe84329b3e138a03415e1c65b4c719fd211ec5fde25ba26c028f4125476097bf23451070113e84e39bb8c499dd8c6e6d1ed4bc69342cf7fd0e968481f2b678a2db1181b6bd3a4c96117c1e918f37f2f3e91ecb3ce6cd648d703b99f1bacb67044a0eff3148bc34c906a63ddb152b9ab1257df3133ac54c4cf30fc0ce166165d6a2b4fbe12a0aca870fa50903db507fb26f2e88570ae85750d005fc656f2890df692446585ede31d3658dc2a1fd3423f4d08254d2e8eed245c6120ffe63f91565d835573136244dc6a705e6b495a62d9b9edcb810a62a55ea7c91f5a6bddbdfd7e2a367d13eecd9b2aa30c553d08d7577ff67da6c5816e378d2df01b9944331021dc30626c10844d66c911ebadec36bc5772fe8083723c0efb94618ff76452a20a0dd6db43cdb17cf70e32c2318dd12418c9ef9905dacb06a366060d8089874176a53565e1262355f5aaf87d290382255d2908fc4bf3dc555da0dfe9730ffccfcfa938ab47f6b2c634069308578fd9fca08d12244032640d11a56e1366163ccb48144f76d64e008ae034e4c80c349ce2f45b3dba25353a68910abdedf910148e35c87945a831bc1da4423d559a52084c0c47f3c4ff1ae1f19d706c3a4a67cc391e89605734b7537e5f6ab9ab5d6bf4d5599d4dc4e4c53379d31b352030e40365014ad50f0f58ae41cc3bd7f769f8c719fe6e9b64cefa598fae8ee312ff5e9f2713fc4be1cd6434670c2302b167f6d79f08d684abbcd6f7d3c0c7a5d6ff2e1ee951c852f7865b7a115d8d548b42da84387dae73a3001e25879e72de06d279fc714c455d9d757737d8b2885ea161806f86f8e11c6f1018e13044a6d872c20b14420ea052bcde8494116a3e663a36e4aecee1bb0816d1011c72ee2818e77e610bcc31f195143829809ec99dee0bec2cfc0eb893dbe3b8a5ced073497c03f473bfca940d76a98ecafe9b8052f3d6e078405220217b47b27e7a94215de1590250c24cedfc3a0850c367715b004e1d8c0313df90fdba9303897c23af5c769b1274c85f01a95c5f64906da37323ac73d537df2958e9cf45be94cdbc412c012eeaf205beac43d32151b21790e78ab803e5419dec30394a7970bb8990c92d22e9f0f84c34225e49980e01b362441e33ef306107d7d71c495c5a2bba22da7ce8c06900d70263b32b8792ceba4f2baac81c0ea9d07b68caec221fe4afc505a3a3f7e6949190632843887f956548f95591865ff9c76bb40d20d62e1a938fa5ccce5d9e8887b9dcb8964be4827e148121ea4a7550862395218a9aee03302405cfaa6f95736d73b3eef9bc09dcfbc37b6bc7a50776991cf39c09c29d6b1f5b3c603b66e5dc480ffb59cdc33e6444ae9ab46639e9db4d62daff217b3bb5d17816c914b434c9cf5bf3e07391e103135c57942583d0ae57bdba3f6482949ef9ffae3111a583eac514f2d12e78767bb272fe7f819b80f23f1206a007d33b33a4b50053c4036bb17bbb7690907f31c43ae8fb82d88055e4cda6d26f222d5d417a867e7a3f63d334c70821ac2c58b4096c865eb17452b9311ad570fe18fa81ec5d68dd0fbcc77aaed1e478b4acb987544cbbe908540aedbd349a67e7d4005f7769260f9f2c91b47ee319340604a632a92bf01dfa57103723c105674f5c976a09091c876028bdc371c2d269f3bf001126dbe3ac63700cf004f96654cf5d09d4eb0c3f6a54de8ab11bb8a7bc4659e847317c8a99a29a724b93ab29ca036f9ec55bd733d6b39ce49af4a77f546f1459a5bb549a1605d500e130d787efcec42c37b0d486a6d39719f68f79ebcb31e8f24c923a7a51a108f21dc33de6366d19e1f7f00fd3d0e0d984ec433e2c0e40a95896a3a4ffb54e7151077e900bb930249308ade7e945721eebf41e44ce502fcf86becbe5eeaa2aee149ab35e20f2f1f2eaed82c5aeb25fdf5e45beefc71844206aad997c44f29612a109189b021dc22d1d7510e416e90cf145033af256f8b180e20112d9ad45438e5cf3bc55ba367e625fd2eccc066d06bac1110f2624b893d7ee65245835c64f7c376794ec2a9d5516dfe4c0ece086505b56a181955d8e9858dd9e3a330595fbda3d8379876cb4dc1c8802dac1225667ff39fad24d88e1614f532043705854c0fd113520183da1de0a035cd6e05969c1756a734ea48a76e98bcd08327350f16e799f9090ab6d88d5f3865d6cee76da8d08edcf66d3383f033158453b9ea9883619c2603aa5192c2fbce40e671bbbc9c903a51ad6da84ec2dc105971b0a3f7d6af5ee9a4bdcfe0db4b26325b8ca9320bccf71ff60c850f2216a69659ff5c32e34fb605085d1f56820185c9d514e7d98b7997e5384d41192ad415fe1aff9e099c28d4629d1e0c4c61adfde237c99582884a66291bac5776762d617683f722bb7e15973f22ce59723d18e58dbc28c36448317f6e5387864df490f9d33317cd6e8db5b4914d51cfc456398b754086143a5c18c8fbb6793bb72b9834f322dcadf1cae78375dbcd7b4d83df8ba5c2a5ff7b87d7ec082f7f3823160df1c2a38b98cbddace656f6db5f95ad4f35fb91471dda4d0f82bbb483867b3e1bd3ab7daf68718750054817b8f9d3cafa2f6b31c6f755c241bb4b707b9f989418962a0620132c19fcae4d6f25eca52b059f9b56ba1b0131584ec7d1337a72ff6a7fff660331c3528afed353c47febe0b0261597473c6a407b8e7a38fb2df361179aeff425104cc0908a0fde4908d42b641490cc9983e52b7ad82646e9f30f495a19daa096b448316994116efdbb769594dc49a2dee258a973f9e32e2f3fedc433b3bf257077fcd5725200e813a95270d6684ae184765e2da205e83062b14adc5459aca2eb6a687341e7f4c1121c939d518553bfe3437e5d76f8a4684e09048af2c5edeb55f264735b4e5546f2291d7473fc3dc161940dd18316fe705cb4491b3b1929aec1a06d97f0d7ca442b5ed44cf69c01579fc4cef18affb26ce0371ff8c03c2392374c435593550d4d0455ad89344e63880bb6bf436093d337a7dd4b4de7e612b29bc931f8cb4147c2880bf7d237c056be5d60daa3e167e5309758702ef63479df81efbfdbdca182149a9df0ff3f687161afe1bcecfaf2377d8687cba04bcd865160816a947a547ce406cade5a6f9c656749c8b00538898a2de40cdd9d3c2b3648ff11c5986f7902403d75b1ef49fd98c41d4a03767d678a4e392cd43686c4833a7f8e0276f214a2f64cbf22e8ca469176486de2b2e97af3a1189892c10ec8195ae2aec193f4b62b62c1c0361d60807206beca4a95f2c991ecdd301dae7e572f559ed021b38624545030110a72a6b069afb30c0c8660fc9e337fe28a6c71f9beedf5819fa68500db7fe82dbaff74760ed991b2d41b41ab847c85276bbb7b06e1ef10d7945c29b78abe873d7a8a73d37769d07616317b76f5db59033a03a5e34df616def83aa9297fae3a6b136a4e617640c6e7b2018718120db423220995696e9184dbfba98b38615d5a2bb2d13fd724407c71c2b2d33225b05e89ca48ca5f0268991d2b4af40bed5eaddffd9db341c28d7569523126d9b20d6e30e6d98a39e1bdd46a0a94007d35d3570d58484b27911cce64a97d5f286b8cf95bf87d02a4e7282a80af5c56fad9f16c9f2e279d586af83d3b58359de7d44aa2af8479d11fb5f28ebb9fcce7f3b1b5963fb0e416b938a3cbfcfdc3c97e54b7117afd5ecc4353450a2b7f4e6e65bdb050038fdbf1d5a9a22173ef06af39791978fcb8bdc5525154dbf6263f5996f276a592abefa7b8c853831eb927632827d762c058b5a39d82490a4e0e171935cb212a2d5030afb73addcae5d0832a5b965fe55a53e39671f3bd9d1a3d55669465266361bc6657f8e17a58341f5c3d6e60193a95699ab75299c019ae6a8e042b04bdbc565bf219110d5fd973c10ca2e94c74a71dfee3c23d11546d35353ee2b8fe4c9b6f301631fb9b919f8157059637fabc6b12bd9405d18901ae290913c1cc0c7257d7b66809781c30f0ea85d7d5e128be0e3a2c5a52c3916a09f2d3b7bea02811c0549ede6769e3c33c82220d247241eae26a6647b8a9f3b821de73ffe86c74a1663463c7956dc99bb2fcde58c95216d648e2d49e940b208c40e317d3ccda9c3ad9bf1a193e3769101f269c18f8fb73cfb6b3411a36d70e6723a4d24f4bc77857f86d32ff660d4d354506c46f03b7793b03b499c22a6e95306f5a9c5583f5cb7e8da049d859955b956061258ef0eb00fa4ddf1d376d49e80251fc803913c82cf756b52fed7e3ebc6a362fefe604f9f65dc0f66a01d56717242ed1ae7a36129786efca884d45487de83c1f46bc56f4b6b27fcd68c57f909d107d9b3ae23df79544e81df3fd6b3a21f58360ebec55f77c5b0c122070b70be0b54e1c3589d3b33fc68dfbc7efac254116c36c33fa9160ad9652b73e19085927c83d4726228a5a4598f83aa2b17f49b6b21cdb4bc31853f96dfd5ea1667c7c85e42c5249355393537365671a61e70f035dc79928a5bba1153eda6e28eb28e429f7cbbee3741caaa10a0f67a767c36f8ada6421789bbda07e89d2f5cc0f42c9524750c45522c4b167d94e93809ba7d400b6b44e613b8efd1f447b365e1f3abafa278b96a08f15f361a69cf9bec4f0359d6b210b13f3614baf9fb7af6ad37b0077c6b83437092bc02b207b113709c91044d219ff54c8c5cc727cd143be2ecf48f60b027974ad40cc1b2a143c23c0ce611af5448ce76850ae10cfea41b8bb4ff4fa3ba3edfee0075aa538a168144991c46bba291f28d8732037d6e48cdf9a2ccd89be4bf8ab16a39fbd38f582cd6014a3fab759845ccc6a7516a0bba5ceb892f84b64eb15ff1d9f14c64145b3b6baee88ad76deb22a1f168c5151ad91c17d3588691d509b50d745e3b2e593694c90550cb76679edbc07e66e95837475af5001b717bca8d81151083251e4be36cd617d0c6505343f2d1e84eb97b0bc132224a6c86051a9cc122e162b27e8f3854f8c4693cb194e17bf997a99c31869ee03e59c0e9cc110035a6fbad9a3a80cfaaec0d0c835cccd7ca33ab0a50b3ee514d361685e40a43ca654e8ce914af01d2b1c07c41ade667c27f8759851b668f93163810ab6736ce1d4c60b308d9567851a2f36e9fc6f205b83d403ea0da8663f0b69f9a0a8f88a9bc7896efb0ab717916cca24d2aab5b5dd82b4f21b6a422cf66e584d00b1b4684284768ac3ffb9fecebf9"}, {0x38, 0x13a, 0x9ce, "376247db6cf4dfb93043c0dd25652ef4d75816d92869f2c799495e247f37a159cc18244f97cd"}, {0x1010, 0xff, 0xffff, "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"}, {0x90, 0x107, 0x6, "ff89637825a0f4e59c507d5cd04a694bab3fb02d4ef791e142ea0cdc4e35d9e9b2d4feb5cdb96cded2bb5234a9a663bf639ace4f2b60ef06c3c64bbb7d6b665fb56b86881b63ff325301f5718ccfee05ed7af743d936dc6ddd5fb3d3c545544c38d1966b622ba7a756a8a6d5b13ec523e255d11202cb38993287be"}], 0x2180}, 0x0) r3 = getuid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002900)={{{@in6, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f0000002a00)=0xe8) mount$overlay(0x0, &(0x7f0000002880)='./file0\x00', &(0x7f00000028c0)='overlay\x00', 0x1000000, &(0x7f0000002a40)=ANY=[@ANYBLOB='index=off,nfs_export=off,nfs_export=off,smackfstransmute=syz1,uid=', @ANYRESDEC=r3, @ANYBLOB="000000000000000006000000000000", @ANYRESDEC=r4, @ANYBLOB=',func=POLICY_CHECK,permit_directio,\x00']) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4200, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)) splice(r0, 0x0, r0, 0x0, 0x6, 0x2) r5 = gettid() getsockname$unix(r0, &(0x7f0000002c40)=@abs, &(0x7f0000000200)=0x6e) fcntl$setsig(r1, 0xa, 0x16) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0xfffffffe, &(0x7f0000002d00)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000002b00)=ANY=[@ANYBLOB="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"], 0x4) 23:49:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_ENUMOUTPUT(r2, 0xc0485630, &(0x7f0000000000)={0xfffffffffffffff7, "e779cbb4bfb640fc0f32f4b957c0b0d4ee4f24c78f184ae16eb47998648f8315", 0x2, 0x800, 0x2, 0x40014, 0x4}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:49 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) lremovexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_default\x00') r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) ioctl$VT_RESIZEX(r4, 0x560a, &(0x7f00000001c0)={0x7fffffff, 0x618, 0x0, 0x1000, 0x3, 0x47}) ioctl$SIOCAX25GETINFO(r4, 0x89ed, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000000)={0x0, r3, 0x1}) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1895.128163][T19197] bond0: Releasing backup interface bond_slave_1 23:49:50 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:50 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) kcmp(r4, r2, 0x6, r3, r1) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1895.270525][T19405] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1895.281464][T19404] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:50 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1895.314315][T19418] bond0: Releasing backup interface bond_slave_1 [ 1895.396453][T19481] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1895.449288][T20125] bond0: Releasing backup interface bond_slave_1 23:49:50 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:50 executing program 5: socketpair$unix(0x1, 0x1000000000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r2, 0x0, 0x6, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0) ioctl$RTC_VL_CLR(r2, 0x7014) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r4, r5+10000000}}, 0x0) tkill(r3, 0x1000000000016) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="6700161056c34ed947636db4b929d8c2f22b4da66d3c619180986d452866db73fb20d4befb473dd016761521f0e6acae2d3ba5c022d3ed0dd68c786e9e8eec2ac4988f6b45917f40b3cd6f4eabbb2551c83014"], 0x4) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x7c, @rand_addr=0x7fff, 0x4e21, 0x3, 'wrr\x00', 0x8, 0x53eb, 0xa}, 0x2c) 23:49:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = pkey_alloc(0x0, 0x3) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@random={'trusted.', 'em0[vboxnet1em0)!\x00'}, &(0x7f0000000180)='system\x00', 0x7, 0x2) pkey_free(r2) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:50 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_create(0x20000000, &(0x7f0000000100)={0x0, 0x12, 0x1000000000000000, @tid=r2}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r4, r5+10000000}}, 0x0) tkill(r2, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:50 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = accept(r0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000100)={0xb0, 0x2, 0xfff, 0x401}, 0x10) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40000, 0x40) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000000180)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r6, 0x0, 0x6, 0x0) accept$inet(r3, &(0x7f0000000240)={0x2, 0x0, @multicast2}, &(0x7f0000000300)=0x10) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$rose(r6, 0x104, 0x6, &(0x7f0000000000), 0x4) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r8, r9+10000000}}, 0x0) tkill(r7, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="6c57d20de5913f0665057bddc97e7ea5a12df4325365ece9584b998cbd7352dbac052cbb4ca2c66a00399673af52cf5e24805b73b6e8cdb617b1b26f9f0b12cf67f1d8af1750"], 0x4) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000200)={0x170, 0x3, 0x8, 0x6e4b, 0xc0000, 0x8, 0x100000001}) [ 1896.386605][T20044] bond0: Releasing backup interface bond_slave_1 23:49:51 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) connect$x25(r2, &(0x7f0000000000)={0x9, @remote={[], 0x0}}, 0x12) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0x4) 23:49:51 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1896.530147][T20300] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1896.548154][T20333] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1896.571546][T20359] bond0: Releasing backup interface bond_slave_1 [ 1896.661171][T20429] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1896.689067][T20997] bond0: Releasing backup interface bond_slave_1 23:49:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:51 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000000)={0x0, 0x7f, 0x0, 0x8, &(0x7f0000ffd000/0x2000)=nil, 0xfffffffffffffffe}) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:51 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x3, 0x1, 0x6, &(0x7f0000000040)=[0x0, 0x0], 0x2}, 0x20) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) ioctl$SG_GET_TIMEOUT(r4, 0x2202, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r3, 0xc0585604, &(0x7f0000000140)={0x0, 0x0, {0x7, 0x6, 0x100f, 0xa, 0x7, 0x8, 0x3, 0x7}}) tkill(r5, 0x1000000000016) 23:49:51 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) timer_create(0x2000000000000b, &(0x7f0000000040)={0x0, 0x3, 0x1, @tid=r2}, &(0x7f0000000440)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) timer_settime(r3, 0x1, &(0x7f00000002c0)={{r4, r5+30000000}, {r6, r7+30000000}}, &(0x7f0000000300)) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r8, 0x0, 0x6, 0x0) r9 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000200)={0x6, 0x5, 0x0, 0xca, 0x3}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r10, r11+10000000}}, 0x0) tkill(r9, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="73797a3196a785e61949655f432144e51c3c5459d34bdf6175b21498024f62c4db2f63adb16e0206d519dc4fdc7f4ce9e674a9758dd11a6563a1f6240394d97463e9f8266ca44e5fa1050000006bd0b26869ca104fb09e9971abcc7ff2090549a31bcd2cd4ee5b033872e0314cfc2e5c1a6061456565ad95cf53ca1d1d55b1604bdd232aa374e895fc2deff053e809affe24fe4534f3d00655f2180aeaed9935ff8a44f6df2df325938758b8b22dc36906057dabfc9aa15605210abf0977ebaea213cff1530676c9944ebef3"], 0x4) 23:49:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0xb8, 0x2000) ioctl$KDDELIO(r3, 0x4b35, 0x74f9) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) modify_ldt$write2(0x11, &(0x7f0000000380)={0xfa22, 0xffffffffffffffff, 0x2400, 0x2, 0x672d, 0x0, 0xfffffffffffffffb, 0x8, 0x40, 0x19}, 0x10) ppoll(&(0x7f00000003c0)=[{r4, 0x8ab16a52fffce157}, {r0, 0x1040}, {r1, 0x10a0}, {r4, 0x1a}, {r4, 0x2102}], 0x5, &(0x7f0000000400)={0x0, 0x989680}, &(0x7f0000000440)={0x10001}, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r4, 0xc008551a, &(0x7f0000000600)=ANY=[]) tkill(r6, 0x1000000000016) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r5, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x480424}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0xa0, r8, 0x10, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffd4c45581}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xc850}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xca48}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4801}, 0x0) 23:49:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x20000, 0x0) write$ppp(r2, &(0x7f0000000180)="6e2cd8835eb251e563", 0x9) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000100)=0x4) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r6, 0x1000000000016) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000001c0)=0x2) 23:49:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000000)='syz0\x00') timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1897.788824][T20998] bond0: Releasing backup interface bond_slave_1 23:49:52 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:52 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r5 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="84232e34d879e2190c609042f4fd57ed7a9756f2836b67b6508e7756a78fecd031dc25d8706f98ad103bdcf7f745613d31dd1bd24d2a47fdba0044", 0x3b, 0x0) keyctl$assume_authority(0x10, r5) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) connect$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x0, 0x1, 0x5, 0x7ff, 0x100, "3ef7e20cbdd97913d40c80fe43a74805ae120b39c2cb8c1ed18ba2fe8b08cb375ebb1fd31d6ba7983591388541b255a431cd73c191f659d198ddb4b6299427", 0x3b}, 0x60) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:52 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) fcntl$setown(r0, 0x8, r2) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="663c25f3"], 0x4) 23:49:52 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1897.996278][T21180] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1898.007499][T21193] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1898.026347][T21218] bond0: Releasing backup interface bond_slave_1 [ 1898.103922][T21340] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:53 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:53 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1898.166553][T21948] bond0: Releasing backup interface bond_slave_1 23:49:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r1 = creat(&(0x7f0000000200)='./file0\x00', 0x20) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000240)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x80001, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000140)={@rand_addr, 0x0}, &(0x7f0000000180)=0x14) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00000001c0)={r3, 0x1, 0x6, @local}, 0x10) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x83, 0x80) ioctl$TUNGETSNDBUF(r5, 0x800454d3, &(0x7f0000000040)) ptrace$setopts(0x4206, r4, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r6, 0x0, 0x6, 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r8+10000000}}, 0x0) tkill(r7, 0x1000000000016) 23:49:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)=0x0) sync_file_range(r3, 0x7f, 0x7fff, 0x2) tkill(r7, 0x3e) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="91ca245e"], 0x4) ioctl$RTC_PIE_ON(r4, 0x7005) 23:49:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r3, 0x111, 0x1, 0x4, 0x11f) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) ioctl$CAPI_GET_FLAGS(r3, 0x80044323, &(0x7f0000000000)) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="8a105dc90e5b4282e7ba1d474271eac8"], 0x4) 23:49:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x1000000, 0x0) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x100, 0x0) ptrace$cont(0x1f, r2, 0x9, 0x970) write$P9_RVERSION(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="0a00000065ffff00040000fbfd3950323030304940000000000000000000000000000000"], 0xfffffec1) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r4, 0x4040aea0, &(0x7f0000000200)={0xfffffffffffffff5, 0x200, 0xffff, 0x0, 0xd47, 0x3, 0x81, 0x6, 0x0, 0x9, 0x81, 0x4, 0x0, 0x5, 0x800, 0x8, 0x100000001, 0x4}) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r6, 0x0, 0x6, 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) r8 = inotify_add_watch(r5, &(0x7f0000000300)='./file0\x00', 0x801) inotify_rm_watch(r1, r8) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$netrom_NETROM_IDLE(r5, 0x103, 0x7, &(0x7f0000000040)=0x200, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x200000, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r9+10000000}}, 0x0) ptrace$setregs(0xf, r2, 0x10001, &(0x7f0000000100)="eec551df55de79e3f5d2a46341fd833a0b143b0f7264d15dfb3dce800c982a2f8f8a137da5cf4a7c0ef7dd943b1e9a370331f8dc590b0337db0206f000edbe1a6ca5510a15fa7be2f13bd475e23b72c7864499b7652ab4d543b12155488d48653a0a5011bfa8dd55fed5d52b6e07861252c4715b3ea55696e26175ffbfac8fc211f151654ab2a7a83861e8c9630cdf6a6e42e5bc5bf1b8874c3d437ff013d0665f19a61051b5299a8c94") ioctl$sock_bt_cmtp_CMTPCONNDEL(r6, 0x400443c9, &(0x7f0000000000)={{0x7, 0x9, 0x800, 0x5, 0x6, 0xc416}, 0x9}) bind$bt_rfcomm(r3, &(0x7f0000000280)={0x1f, {0xfffffffffffffe00, 0x5, 0x4, 0xf12, 0x8, 0x2f2}, 0x100000000}, 0xa) tkill(r7, 0x1000000000016) 23:49:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0xc) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) [ 1899.023271][T21959] bond0: Releasing backup interface bond_slave_1 23:49:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0xc) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r2, 0x581, 0x8) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x4c, r8, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc}]}, 0x4c}}, 0x0) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="b1f663b517fc8f2037d5e11118bbdc7746bcb2f3604817d06f581c8348b0fdf8907fb3280152f7ddcf03badd6b0f66dce1a652ce74ff5ab61b9c78dca19fa1497ff593099562db7c5ccd17b9ef4700ee5f680f095445fedf66f84084f5fb6c6718214555e91abba23182d5c1f8a40d8cfdf21eafac4a5a5b5d269b486d01a8e79ec7da7716"], 0x4) 23:49:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4207, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x5, &(0x7f0000000000)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) [ 1899.185999][T22085] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1899.196550][T22129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1899.217368][T22206] bond0: Releasing backup interface bond_slave_1 23:49:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:54 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1899.295819][T22271] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:54 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @remote}, 0x1, 0x0, 0x4, 0x3}}, 0x80, &(0x7f0000000580)=[{&(0x7f00000002c0)="3aa28bc5ff68249a77d52eeaf2487924086095437ef03872d56b328ece83ebe65c335878644078cbb65c6eaca35ecd89a3f16f197f7532d6895965411f7ff7fabd5253a4f91a8685cab404be82dea4d02a19c45b5f3d3030abd88828b01f6dfeb8cc3fe8f8b49f271ea5c11a71573d36d3b2af2a194857aa506aac", 0x7b}, {&(0x7f0000000340)="14a680d99c24cb0c0109c9ecc7ca356f8468ef091d478f9b37a62f2ddf11a49872ae42a3460c2fc84773887d9af7f674094d17397953906547e58a280209014b5d3f1602884bd0a61da2e91296a64231c77fe53e9f782b5fe753a226d9d01f4a941d9feea0f771d5e8e0b4df3b74c6d5a83be1652fd9832036a11d22a3a168044536db2a1a591d67ed8598ee21d3de5db7dc6f6acd7aed61bce3967c19a486cba751e77179a3", 0xa6}, {&(0x7f0000000400)="f6238fb1682ee8a56916e807e1e0084f3c92da3e9eca42e5c24a7a9d443ff63fe4b32ac3a46b072b147bf8da70f515714f8c9086cbc3ab0c0f8090dd3804f525b0de5726a8f1520fc08a0b212a57f629e89adb3a61d1f7efae353d9b76e42146b848873700902277d00577fea7738e1af76866fe5efae3261aa0d8bdda782fc8f1e43829d37df553c77d9f935906476c551825736eff3e4f3607e64501181d8b7e6841a06174c678e11b681a7d340f0d", 0xb0}, {&(0x7f00000004c0)="9d808c509028e2320a11fb838507fd61e55d3f0a4542cd93f70005b5a2ac196a1519e9108201e244ab200c3d3b748d209acccddd88d7a792ba2f5320ee7db76a76b9ac5534d061fb2167b79503cfc8bac259db5ac1403a79d8e2b11cbf67348e791b9c7fc2b66043ff4b1c17120d886f2dd8f7a1b734f1442012d93948b4ff23ddd906bd8366b706bedad91aafe825ba7a78133dd0146f16d35c283d67fb1b11e5f42cdd396cf4e284856bcfc2df440987ddbf9f80929fa5571a", 0xba}], 0x4}, 0x8080) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = semget(0x3, 0x3, 0xa) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000180)={{0x4, 0x4067}, 'port0\x00', 0x2, 0x20000, 0x7ff, 0x31f, 0x9, 0x3, 0x8, 0x0, 0x5, 0xc2}) semctl$GETZCNT(r5, 0x3, 0xf, &(0x7f00000000c0)=""/95) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000000)={0x401, 0x5, 0xfffffffffffffff9, 0x3a, 0xa, 0x0, 0xa3b7, 0x0, 0x2, 0x80000001}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000140)=0x1, 0x4) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r6, 0x1000000000016) 23:49:54 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() getpeername(r0, &(0x7f0000000240)=@nfc_llcp, &(0x7f0000000040)=0x80) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) write$binfmt_misc(r2, &(0x7f0000000200)={'syz1'}, 0x4) [ 1899.481267][T22923] bond0: Releasing backup interface bond_slave_1 23:49:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000000)=0x1) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:49:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x400001, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:54 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) [ 1900.239776][T23017] bond0: Releasing backup interface bond_slave_1 [ 1900.289910][T23025] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1900.313733][T23026] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:57 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x8, &(0x7f0000001600)=[{&(0x7f0000000100)="3fe4c63c7523e8b7105e4970c8dbe8144e2508886cf8bab88ce5893519d6023384d2f010b98032007999ad322ab535dd7389f6b1b988e5149f26c84c292a2ab4610c8df25e9a3b5c973b865322c59c8f2a9b172b1c9eda2fdd8bd671c2d7904d10b9ea74d4190f01734dc69fe8a6f5a18ae2a36f78612fdb714ab79afd734670023ff044bba31b901d836b52b82f2f2c1196dd3cd8925f0c9d3d7ac7bee0a221f7bb37be9af3d18480ab3b95fe46653e5e0143bb8fb786e9b97ebad9338a8bcc7914dcd1464f54fcc4658dba0c54ba82a75120a462cb0c3ce9", 0xd9, 0xffffffff}, {&(0x7f0000000600)="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", 0x1000, 0x327}, {&(0x7f0000000200)="0a107bfcbd628c1b26abb70583dac9cb0310bc27bb9da14150943150353da4b420198e76be246b117852a2108e9abbc71ee917ec6ceed7d3bd9ff59f9a4326bc78594dae148331ff48a19d189172c389a01bf3e2d6b4cda848b0f042b863a31ddd4ddbc2d420e23e11f3a5f88e79c5c3b4e944ef5df9e9c2e3f3b81530730c53ac74743862e738e44be648642350c36c1544bac55dab7721cfedd1d3c74bc88c6f595f235fa8da3099e7feebef1987741558cea473e37ad16cc56117581d0f782dfebd58cb218cc51bc9883ef843806b9965", 0xd2, 0x7fff}, {&(0x7f0000000300)="b3539be2015061d09a01c7bfbc8fded8109e882886c5f2952ce950607194a006ca40c930736becde29c83eefb1e979ad58c6d16bc3b0bccc6403e5413349698e30a0cba29bf27ac4178c2f78a06a0bfaec4379d6b1a9f0a76d6aceed7d8633ad59b1ba6e509cf2eb88134e13e801572903cd13a04a52bec568abc03b2d41d35242f0537dc8f03ad82b3b56ff2fa488419c", 0x91, 0x1}, {&(0x7f00000003c0)="76abfd8e880f8e0cf81efd1f2991fcca886088071cf721b44d9f5d2929961e4063c3cc77dfa1331691ded91072cad362195c8f72af575c81919757ddcb643df8ad02a9e92856ef15ab329a32dcdf3583bff041a8d77107e12e1a718babab8437cdcddfd14aa6a56e7cd476470981076e81935fe10098c4977b5e87e78c01db2174c94af6045756dda2b0aef395c31bbedfa451db11df9896306352d1ba3da0999846bfeceda12ddf31a7c564c86e7d9dca90b724549de5e34be9297222d6af6b0e78a0ba5485c11c01a29e838560bc8bbff24a592fac0be663db72324f62ef59817ec9f3a4f3769d01d67de5ab5bcebb83cb37", 0xf3, 0x400}, {&(0x7f00000004c0)="80d8ad6294c8dd984fc3d6d877dae2c8a852e2ecb19a160e07dbb19e9b93da", 0x1f, 0x3}, {&(0x7f0000000500)="375bc5bcecc14e91c51aa283e3cc55e7f5cbc0803f4ba704a163b08dbeb638cd2a38ba5f479e39f53a75bb1840ffcccee5e7fa1cfce7a425f85ee6c52424e0b9d9038cca2a1c11a126c4371f1fbd9ab505c31d31ef0991cc98e25c4e3bcdcc2c0b81b1ed6a975fc6261357e561ff801da37a8fec5641cd", 0x77, 0x521b}, {&(0x7f0000000580)="48d641afee4d73cbfeb9fbf964bad28507b6296bd8752731fd2e4df41a9bd637964e", 0x22, 0x4}], 0x100a004, &(0x7f00000016c0)='/\x00') pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:57 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:57 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:57 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1902.371488][T23664] bond0: Releasing backup interface bond_slave_1 23:49:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) prctl$PR_GET_FP_MODE(0x2e) setsockopt$TIPC_GROUP_LEAVE(r4, 0x10f, 0x88) r8 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r9 = ioctl$KVM_CREATE_VM(r8, 0xae01, 0x0) fcntl$notify(r1, 0x402, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x5, 0x2, 0x8, 'queue0\x00', 0x1}) ioctl$KVM_SET_TSS_ADDR(r9, 0xae64, 0x0) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x989680}, {r6, r7+10000000}}, 0x0) inotify_init1(0x80800) tkill(r5, 0x1000000000016) ioctl$CAPI_INSTALLED(r3, 0x80024322) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000180)=r2) write$binfmt_misc(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x4) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000000)={{0x2, 0x4e21, @rand_addr=0x3}, {0x7}, 0x0, {0x2, 0x4e22, @broadcast}, 'team_slave_0\x00'}) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000280)='/proc/thread-self/attr/current\x00', 0x2, 0x0) [ 1902.452441][T23652] bond0: Releasing backup interface bond_slave_1 23:49:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x80000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:57 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000000140)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:57 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x4) [ 1903.262034][T23666] bond0: Releasing backup interface bond_slave_1 23:49:58 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000100)={r6, @in6={{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x28}, 0x8}}}, 0x84) 23:49:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000001640)=0xffffffffffffff8a) process_vm_readv(r2, &(0x7f0000000400)=[{&(0x7f0000000180)=""/73, 0x49}, {&(0x7f0000000240)=""/200, 0xc8}, {&(0x7f0000000340)=""/98, 0x62}, {&(0x7f00000003c0)=""/21, 0x15}, {&(0x7f0000000600)=""/4096, 0x1000}], 0x5, &(0x7f0000000580)=[{&(0x7f0000000480)=""/113, 0x71}, {&(0x7f0000000500)=""/105, 0x69}], 0x2, 0x0) gettid() wait4(r2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x2) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000040)={0x6002, 0x0, 0x1, 0x50, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) getpriority(0x3, r5) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000001600)=ANY=[@ANYBLOB="736a6295ab42d217233b4f01efc0d6dfc1797a31"], 0x4) 23:49:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:58 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1903.401654][T23664] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1903.424309][T23854] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1903.436158][T23844] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:49:58 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1903.611507][T24521] bond0: Releasing backup interface bond_slave_1 23:49:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='syz9'], 0x4) 23:49:58 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x15, 0x80005, 0x0) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) rseq(&(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x7, 0x1, 0xc06e, 0x1f}, 0x1}, 0x20, 0x1, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) 23:49:58 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1903.804738][T24629] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1903.821007][T24522] bond0: Releasing backup interface bond_slave_1 23:49:58 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x6, 0x20000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0x8, @local, 0x6}}, 0xe4f0, 0x80000000, 0x2, 0x4, 0x80}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000380)={r3, 0x4}, &(0x7f00000003c0)=0x8) r4 = fcntl$getown(r1, 0x9) ptrace$setregset(0x4205, r4, 0x4, &(0x7f0000000100)={&(0x7f0000001600)="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", 0x349}) r5 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x101, 0x0) ioctl$NBD_SET_TIMEOUT(r6, 0xab09, 0x8) ptrace$setopts(0x4206, r5, 0x0, 0x0) ioctl$KDGKBMODE(r6, 0x4b44, &(0x7f0000000040)) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) semget(0x1, 0x0, 0x194) splice(r0, 0x0, r8, 0x0, 0x6, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_nanosleep(0x7, 0x0, &(0x7f00000001c0)={r9, r10+10000000}, &(0x7f0000000200)) r11 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r12+10000000}}, 0x0) tkill(r11, 0x1000000000016) lseek(r7, 0x0, 0x3) ioctl$sock_inet_tcp_SIOCOUTQ(r7, 0x5411, &(0x7f0000000140)) 23:49:58 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x80200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000400)={0x0, 0x4, 0xfff, 0x10001, 0x8, 0x3}, &(0x7f0000000440)=0x14) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000480)={r5, 0xff}, &(0x7f00000004c0)=0x8) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e21, 0x7, @mcast2, 0x9f5f}}, 0x65e, 0x5, 0x0, 0xf032, 0x20}, &(0x7f0000000340)=0x98) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000380)={r9, 0xb32}, &(0x7f00000003c0)=0x8) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) fstatfs(r3, &(0x7f0000000000)=""/68) tkill(r6, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) r10 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r11 = request_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000240)='(\\\x00', 0xfffffffffffffffc) keyctl$negate(0xd, r10, 0x252c, r11) 23:49:59 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x40400002000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000100)=0x10) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00e7e90d298d8b79470962e1d1298f000000"], 0x4) 23:49:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000240)={0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e23, 0x4, 'dh\x00', 0x8, 0xada, 0x70}, 0x2c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000380)={{{@in6}}, {{@in6=@local}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f00000000c0)=0xe8) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) tkill(r1, 0xb) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000000)={[0x4, 0x3000, 0x110000], 0xfffffffffffffe00, 0x14, 0x6}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) setfsuid(r6) tkill(r4, 0x1000000000016) [ 1904.464798][T24826] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1904.474060][T24694] bond0: Releasing backup interface bond_slave_1 23:49:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000140)) tkill(r4, 0x1000000000016) 23:49:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4246, r2, 0x0, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1904.792207][T24830] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1904.807021][T25122] bond0: Releasing backup interface bond_slave_1 23:49:59 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:59 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:49:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)='system.posix_acl_default\x00', &(0x7f0000000e00), 0x12, 0x0) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000280)=""/200) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) r5 = socket$inet6(0xa, 0x80000, 0x6) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0xf9, "e16e8d0c312ad198b80f557f6e82b7d99759366a132fa2889204ce6d122e59e2b7f1b485b1341f071d59e32b1f96c6a71fc1f72e24d6a9f5922759c67b7e78992ced7602634628a288bf297e9056c0e7dec44498ef7d1fd51c8178e59b31d5143e41de71e7cb45077e99aaf9c01e2dbe5477c8ca2c05cb8bd0f3b16e1911efe400ab9bce365458169ba54befe84fb84b3e8717b0ec7281b9b6f812cb98a8bbcb5918d1700cac238273c5a60022cad1b72fe8eb337eb9754c7569519a19bd3c967e49032dfc4e32a98566c0514943edb56f7461fba457006345c14cad7cccd73828b5337f3499f585e0d792411cd8d33f528c377829bc47b780"}, &(0x7f0000000000)=0x101) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000040)={r6, 0xcc, 0x4, [0x654, 0x1, 0x6, 0x2]}, &(0x7f0000000240)=0x10) tkill(r3, 0x1000000000016) [ 1904.871689][T25149] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1904.936037][T25365] bond0: Releasing backup interface bond_slave_1 23:49:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x21, 0xffffffff00000001}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000100)={r7}, &(0x7f0000000140)=0x8) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:49:59 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:49:59 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000100)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f0000000240)={[], 0x4, 0x6, 0x0, 0x0, 0xffffffffffffff23, 0x5000, 0x106000, [], 0x3e7d25c2}) tkill(r4, 0x1000000000016) 23:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x47a3, 0x4}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000100)={r5, 0x7f}, 0x8) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) tkill(r6, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:50:00 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=0x0) ptrace$getenv(0x4201, r2, 0xffff, &(0x7f0000000200)) r3 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x44, "6cd5f4adda9bbac056ec329cb2b0dc5e53e8fa9a878abd8c06d6855a514e262c910374857c08907fc85004c8d8e3983574de88a07ec42155bd224f373ee6c16f2d37a45f"}, &(0x7f0000000180)=0x4c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x17, &(0x7f00000001c0)={r6, 0x4, 0x19, "3b77309d7a3212933c2086f309136a8b449c461cdd577d5597"}, 0x21) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) prctl$PR_SET_FPEXC(0xc, 0x80081) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r8+10000000}}, 0x0) tkill(r7, 0x1000000000016) 23:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4202, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="00001100"], 0x4) 23:50:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1905.519998][T25518] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1905.544970][T25856] bond0: Releasing backup interface bond_slave_1 23:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x7ffffffd, 0x0) r3 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_dccp_int(r3, 0x21, 0x15, &(0x7f0000000140)=0x1, 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r5, 0x0, 0x6, 0x0) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r7, r8+10000000}}, 0x0) ioctl$RNDCLEARPOOL(r4, 0x5206, &(0x7f0000000180)=0x20) tkill(r6, 0x1000000400016) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="73798e71acbca9c420044af417514addd1e996d828fdce0d66c89f56bbedef7768577c75000000000000000000000000000000"], 0x4) 23:50:00 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:00 executing program 4: socketpair$unix(0x1, 0x100000000000004, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000040)={r6, &(0x7f0000000180)=""/191}) tkill(r4, 0x1000000000016) 23:50:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r6, r7+10000000}}, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e22, @multicast1}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e21, 0x2, @local}], 0x3c) tkill(r5, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) [ 1905.982127][T25993] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1905.994040][T25994] bond0: Releasing backup interface bond_slave_1 [ 1906.043554][T26094] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:50:00 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:01 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1906.083862][T26317] bond0: Releasing backup interface bond_slave_1 23:50:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) tkill(r2, 0x32) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x3, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000200)={'syz1'}, 0x4) 23:50:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000500)=0xe8) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getegid() stat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r3, &(0x7f0000000a40)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000100)="eb1cc7d05c46d02af1a23a59ee9fecb60fd1ee4c49046480434f54e298dce5e255750a887564da39599c41c410e804dc66d49810a05f7af29699e49dbfdadf6645914a9ea1b5c4a0c05eff84c8", 0x4d}, {&(0x7f0000000180)="d328ab217442a107716a181b2572ef894936c062d061809f638f8cb0f8ac2be8a3c982c94f5a09b8789e1623d7dd5f00d4c9ff7e1033f8b4c71cc435408f8b532f786fd3bcd58789fc8b52b879faeee40a654ea686b2fff2f246994fdf069e3814f7a162ac70aa245c72c9b73d81c673fe7ad6c3170243f8f8eae3ba8a23bd628e830396e355e0391a86400e069dbf3dc46b2314354f068b8cbabc3df896bebaae936353c6dc6e8a01fe83903af54beaf902bf488d635322f8e9ac4ccb3d8739f053c7990a8fda0759ad2c0932e6e4d667a133e5819c840da9ef4337f239576069c0", 0xe2}], 0x2, &(0x7f0000000840)=[@cred={0x20, 0x1, 0x2, r2, r7, r8}, @cred={0x20, 0x1, 0x2, r2, r9, r10}, @cred={0x20, 0x1, 0x2, r5, r11, r12}, @cred={0x20, 0x1, 0x2, r5, r13, r14}, @rights={0x18, 0x1, 0x1, [r0, r1]}], 0x98}, {&(0x7f0000000900)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000009c0)=[{&(0x7f0000000980)="6ea81a8d413b25d5847dfdb72617f98dc780c3dc9b653c4560588f398ed3551803b472c3", 0x24}], 0x1, &(0x7f0000000a00)=[@rights={0x20, 0x1, 0x1, [r3, r0, r1]}], 0x20, 0x5}], 0x2, 0x800) tkill(r5, 0x1000000000016) 23:50:01 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x2817f, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000200)={0x5, 0x70, 0x0, 0x101, 0x2, 0x7, 0x0, 0x2, 0x100, 0x2, 0x3, 0x4, 0x7ff, 0x0, 0x5, 0x5, 0x0, 0x0, 0x8, 0x9, 0xfffffffffffffffd, 0x7, 0x3, 0x3, 0x3fffffffc000000, 0x2, 0xfffffffffffffffd, 0xffffffff, 0xc480, 0x6, 0x6, 0x1, 0x879, 0x401, 0x8000, 0x0, 0x7f, 0x9, 0x0, 0xffffffffffffffc1, 0x7, @perf_config_ext={0xcbb8, 0x6}, 0x6, 0xe0, 0x6, 0x0, 0xffffffffffffffff, 0x6, 0x7}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x4) perf_event_open$cgroup(&(0x7f0000000140)={0x3, 0x70, 0xcb, 0x7, 0x20, 0x8, 0x0, 0x6, 0x0, 0xc, 0xfffffffffffffffa, 0x7c, 0x2, 0xfff, 0x35, 0x200, 0x6, 0x1ff, 0x81, 0x4, 0x0, 0x7fffffff, 0x3, 0x1bf4aec5, 0x0, 0x9, 0x7fffffff, 0x1, 0x7, 0x4, 0x1, 0x1, 0x1, 0x800, 0x9, 0x2, 0xfa9, 0x3ff, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000100), 0x5}, 0x8, 0x1, 0x1000, 0x5, 0x2, 0x3, 0x9}, r3, 0x7, r4, 0xe) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r3, 0x10f, 0x84, &(0x7f00000001c0), &(0x7f00000002c0)=0x4) splice(r0, 0x0, r6, 0x0, 0x6, 0x0) r7 = gettid() syz_init_net_socket$ax25(0x3, 0x5, 0xff) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000004c0)=@sack_info={0x0, 0x3d3, 0x9}, &(0x7f0000000500)=0xc) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000540)=@assoc_value={r8, 0xe2}, 0x8) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000000)={0x3, [0x3, 0x9, 0x1ff]}, &(0x7f0000000040)=0xa) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r9, r10+10000000}}, 0x0) tkill(r7, 0x1000000000016) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000300)='/proc/capi/capi20ncci\x00', 0x100, 0x0) write$binfmt_misc(r1, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r6, 0xc1105511, &(0x7f0000000380)={{0x7, 0x2, 0x7, 0x10001, '\x00', 0x84}, 0x5, 0x100, 0x2, r2, 0x1, 0x593, 'syz0\x00', &(0x7f0000000340)=['vboxnet1+{systemlo}+vboxnet0%\x00'], 0x1e, [], [0xf2, 0x3, 0x6, 0x9]}) 23:50:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) gettid() fsetxattr$security_evm(r1, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "160e4ef501433c2392b5e160eb"}, 0xe, 0x3) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000000)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r3+10000000}}, 0x0) [ 1906.607795][T26546] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1906.622215][T26737] bond0: Releasing backup interface bond_slave_1 23:50:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc000, 0x0) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f0000000100)={0xf, @sdr={0x33524742, 0x9}}) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x10007, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:50:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {r5, r6+10000000}}, 0x0) tkill(r4, 0x1000000000016) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="737918f8a77777683f13af271915d551000000007e98eed2aa3cfa170ba2"], 0x4) [ 1907.132665][T26854] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:50:02 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x290000, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r2, 0x7, r1, &(0x7f0000000040)={r3, r0, 0xaf08}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r6+10000000}}, 0x0) tkill(r5, 0x1000000000016) 23:50:02 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1907.176199][T26964] bond0: Releasing backup interface bond_slave_1 [ 1907.224663][T27041] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:50:02 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1907.271023][T27168] bond0: Releasing backup interface bond_slave_1 23:50:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:02 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() write$apparmor_exec(r2, &(0x7f00000000c0)={'exec ', 'timers\x00'}, 0xc) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$NBD_SET_SIZE(r2, 0xab02, 0x319) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) syz_open_procfs(r4, &(0x7f0000000040)='timers\x00') setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000000)="7e9093cf4e431ac5ca0c4741fb6b08f7", 0x10) tkill(r4, 0x1000000000016) 23:50:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1907.661152][T27342] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1907.677447][T27600] bond0: Releasing backup interface bond_slave_1 23:50:02 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) r1 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:02 executing program 3: r0 = socket(0x15, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1908.179601][T27599] bond0: Releasing backup interface bond_slave_1 [ 1908.250964][T27654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1908.263336][T27745] bond0: Error: Device is in use and cannot be enslaved [ 1908.282859][T27828] bond0: Releasing backup interface bond_slave_1 23:50:03 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) lseek(r0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0x80000001}, 0x28, 0x3) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) lseek(r2, 0x0, 0x0) tkill(r4, 0x1000000000016) 23:50:03 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:03 executing program 3: r0 = socket(0x0, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:03 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:03 executing program 3: r0 = socket(0x0, 0x80005, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:03 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x3, &(0x7f0000000000)={0x0, 0x0}) ioctl$VIDIOC_S_FMT(r2, 0xc0d05605, &(0x7f00000001c0)={0xb, @sdr={0x34324142, 0xdfd}}) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r3, 0xc1105518, &(0x7f00000002c0)={{0x9, 0x6, 0x1ff, 0xb1, '\x00', 0x3}, 0x0, 0x10, 0x1e, r4, 0x2, 0x3f, 'syz0\x00', &(0x7f0000000040)=['\x00', 'keyring\x00'], 0x9, [], [0x5, 0xef02, 0x7, 0x100000000]}) ioctl$KVM_GET_REGS(r3, 0x8090ae81, &(0x7f0000000100)) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:50:03 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:03 executing program 3: r0 = socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:03 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x10000) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000040)={0x8, 0x7fff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f0000000140)={0x0, 0x5, 0x10001, [], &(0x7f0000000100)=0x1}) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) [ 1908.873298][T27932] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1908.883833][T28058] bond0: Error: Device is in use and cannot be enslaved 23:50:03 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1908.937693][T27948] bond0: Releasing backup interface bond_slave_1 23:50:03 executing program 3: r0 = socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:04 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:04 executing program 3: r0 = socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1909.348838][T28157] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1909.365030][T28376] bond0: Releasing backup interface bond_slave_1 23:50:04 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(r2, 0x0, 0x1, 0x0) ptrace$setopts(0x4206, r2, 0xfffffffffffffffd, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r4, 0x0, 0x6, 0x0) r5 = gettid() timer_create(0x4, &(0x7f0000000000)={0x0, 0x10, 0x0, @tid=r2}, &(0x7f0000000040)=0x0) timer_delete(r6) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r7+10000000}}, 0x0) tkill(r5, 0x1000000000016) fdatasync(r1) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000100)) 23:50:04 executing program 3: r0 = socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:04 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000040), 0x10) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:04 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x8001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x6, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00') r4 = gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f0000000100)={r0}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) sched_getparam(r2, &(0x7f0000000000)) tkill(r4, 0x1000000000016) 23:50:04 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:04 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:04 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'bond0\x00', {0x2, 0x4e21, @rand_addr=0x9}}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) ioctl$RTC_UIE_OFF(r2, 0x7004) clock_gettime(0x7, &(0x7f0000000040)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x3e) [ 1909.998328][T28478] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1910.007124][T28432] bond0: Error: Device is in use and cannot be enslaved [ 1910.020811][T28556] bond0: Releasing backup interface bond_slave_1 23:50:04 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:04 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(r1, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x6, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r4+10000000}}, 0x0) tkill(r3, 0x1000000000016) [ 1910.479886][T28703] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1910.495687][T28923] bond0: Releasing backup interface bond_slave_1 23:50:05 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:05 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:05 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x800004206, r1, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) getsockopt$inet_mreqn(r3, 0x0, 0x0, &(0x7f0000000000)={@loopback, @dev}, &(0x7f0000000040)=0xc) recvmmsg(r2, &(0x7f00000004c0)=[{{&(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @link_local}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000180)=""/124, 0x7c}, {&(0x7f0000000200)=""/18, 0x12}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/134, 0x86}], 0x4, &(0x7f0000000440)=""/76, 0x4c}, 0x1}], 0x1, 0x40, &(0x7f0000000500)={0x0, 0x1c9c380}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) 23:50:05 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:05 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x6, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:05 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) clone(0x13102001fef, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x7420bbe012eb1b29) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000180)="dc1c58e70c1865ae155a30c73c7f9d2017d558ad3d193ed0da07ba403ce8bf16ade7df042d60c5572417dc1dc97677470224086a82e60a35949af44de05c7b959fe79de9bd428ce94d42252b3563766981aac4bfba62a6ca3fc38b5ee0b613e6e540b5b06ff52339e47ec745a1ea70") clock_gettime(0x2, &(0x7f0000000100)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x6, 0x0) r4 = gettid() write$FUSE_INIT(r3, &(0x7f0000000000)={0x50, 0x0, 0x7, {0x7, 0x1c, 0x7, 0x80, 0xd0, 0x5, 0x0, 0x5}}, 0x50) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) clock_gettime(0x401, &(0x7f0000000240)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}, {0x0, r5+10000000}}, 0x0) tkill(r4, 0x1000000000016) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000080)) [ 1911.132314][T28927] bond0: Error: Device is in use and cannot be enslaved [ 1911.164547][T28930] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:50:06 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:06 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:06 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1911.184965][T29059] bond0: Releasing backup interface bond_slave_1 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x1, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:06 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) [ 1911.584668][T29151] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1911.618566][T29478] bond0: Releasing backup interface bond_slave_1 23:50:06 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}}, 0x0) 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x0, 0x0, 0x0) 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x0, 0x0, 0x0) 23:50:06 executing program 3: socket(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000000000031, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) gettid() timer_settime(0x0, 0x0, 0x0, 0x0) [ 1912.284786][T29468] bond0: Releasing backup interface bond_slave_1 23:50:07 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:07 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1912.349526][T29573] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1912.364828][T29521] bond0: Error: Device is in use and cannot be enslaved [ 1912.405795][T29688] bond0: Releasing backup interface bond_slave_1 23:50:07 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:07 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x0, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1912.737322][T29773] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1912.754250][T29913] bond0: Releasing backup interface bond_slave_1 23:50:07 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:07 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1914.264088][T29916] bond0: Releasing backup interface bond_slave_1 23:50:09 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:09 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:09 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1914.558049][T29951] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1914.566785][T29937] bond0: Error: Device is in use and cannot be enslaved [ 1914.588713][T30128] bond0: Releasing backup interface bond_slave_1 23:50:09 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:09 executing program 2: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1914.919008][T30129] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1914.936715][T30342] bond0: Error: Device is in use and cannot be enslaved [ 1914.949846][T30341] bond0: Releasing backup interface bond_slave_1 23:50:09 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:10 executing program 5: 23:50:10 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:10 executing program 5: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, &(0x7f0000001780)={&(0x7f00000004c0)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, {}, [@nested={0x14, 0x0, [@typed={0x4, 0x19}, @typed={0xc, 0x3a, @u64=0x6}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x11}, 0x20008000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000100)) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xe84b}) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) read(r0, &(0x7f00000000c0)=""/19, 0x1b43d048) read(r1, &(0x7f0000000280)=""/219, 0xdb) 23:50:10 executing program 5: r0 = socket(0x80000000000000a, 0x10000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet_int(r0, 0x0, 0x30, 0x0, 0xfeb8) 23:50:10 executing program 0: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) write$cgroup_pid(r0, &(0x7f0000000000), 0x2d7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1915.659973][T30347] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1915.676879][T30454] bond0: Error: Device is in use and cannot be enslaved [ 1915.690090][T30451] bond0: Releasing backup interface bond_slave_1 23:50:10 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f00000000c0)) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'lo\x00\x00\x10\x00\x01t\xb1\x93\x1a\xf2\xe6DW\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@setlink={0x28, 0x13, 0x21, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, 0x4}]}, 0x28}}, 0x0) 23:50:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = memfd_create(&(0x7f00000000c0)='fd\x00', 0x0) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x12, r2, 0x0) write(r1, &(0x7f0000000180)="6963e6424304006da3a74e3deec6fc5bb9650b5de56946c568f95d22c77190ba406d59a5958def156c9c8a2ac4677afffffffc800000000000200000f8bf54da32", 0x41) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r3, 0x2081fc) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000025c0)=""/57, 0x39) [ 1916.076221][T30456] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:50:11 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000008000a001e96743ca30499651b7b107e3e73c11cd3913a8a0df6480fad1aedf273ad0f7e1b9ed1846624ab39f76afd8349e0ee3422467c3a5d9059b067ac26bb30ae2dc2d23414d29ab193361957d5909edc57d87213a5fba3633ea304ee54ce68290000000000", @ANYRES32=0x0], 0x2}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1916.125971][T30773] bond0: Releasing backup interface bond_slave_1 23:50:11 executing program 3: r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) 23:50:11 executing program 2: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000540), 0xcf53e35) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000180), 0x4) 23:50:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x400021020017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) sendmsg$nl_route_sched(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 23:50:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x1007ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = dup2(r0, r0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 23:50:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x400021020017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) sendmsg$nl_route_sched(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={0x0}}, 0x0) 23:50:11 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) clone(0x400021020017fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0xa, 0x0, 0x0, 0x0) write(r0, 0x0, 0x0) 23:50:11 executing program 3: syz_execute_func(&(0x7f0000000140)="64ff0941c3c4c3597ca50050666600c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") rt_sigpending(0x0, 0xd7547eddf85ba55) [ 1916.928252][T30774] bond0: Error: Device is in use and cannot be enslaved [ 1916.939599][T30777] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:50:11 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x1, 0x32, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) 23:50:11 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x9) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f00000001c0)=0xc7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000200)={0x8, {{0xa, 0x4e21, 0x0, @mcast1, 0x1ff}}, 0x0, 0x4, [{{0xa, 0x4e23, 0x2, @remote, 0x3}}, {{0xa, 0x4e20, 0x6, @loopback, 0x4}}, {{0xa, 0x4e24, 0x6, @ipv4, 0x4}}, {{0xa, 0x4e21, 0x5, @empty, 0x400}}]}, 0x290) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r2) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x73, 0xff55) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) close(r3) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x101, 0x105082) r5 = memfd_create(&(0x7f0000000180)='}#*nodevem2N,\x00', 0x0) pwritev(r5, &(0x7f00000000c0)=[{&(0x7f0000000480)="06", 0x1}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x360) fcntl$setstatus(r1, 0x4, 0x4000042800) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0x526987c9) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000780)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e23, @loopback}, {0x2, 0x4e22, @remote}, 0x83, 0x0, 0x0, 0x0, 0x9802, 0x0, 0x80000001, 0x0, 0x5}) sendfile(r4, r5, 0x0, 0x80005) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) syz_open_procfs(r8, &(0x7f0000000380)='envh&on\x00') ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000800)=@add_del={0x2, &(0x7f0000000140)='vcan0\x00'}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') 23:50:11 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000000600000000000000020000000000000004"]) 23:50:11 executing program 4: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xb) ptrace$cont(0x18, r0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 23:50:11 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1917.086003][T31027] bond0: Releasing backup interface bond_slave_1 23:50:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x100, 0x64f7, 0x20000000000001, 0x0, 0x0}, 0x2c) r2 = socket$inet6(0xa, 0x80001, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) dup3(r1, r2, 0x0) [ 1917.290010][T31078] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1917.408875][T31256] BUG: Bad page state in process syz-executor.0 pfn:782b5 [ 1917.420149][T31256] page:ffffea0001e0ad40 count:0 mapcount:0 mapping:ffff888086974d40 index:0x0 [ 1917.434553][T31256] shmem_aops [ 1917.434561][T31256] name:"memfd:}#*nodevem2N," [ 1917.439451][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1917.459775][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1917.472301][T31256] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 1917.483845][T31256] page dumped because: non-NULL mapping [ 1917.492601][T31256] Modules linked in: [ 1917.499577][T31256] CPU: 0 PID: 31256 Comm: syz-executor.0 Not tainted 5.0.0-rc7-next-20190225 #42 [ 1917.508686][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1917.518731][T31256] Call Trace: [ 1917.522023][T31256] dump_stack+0x172/0x1f0 [ 1917.526358][T31256] bad_page.cold+0xda/0xff [ 1917.530773][T31256] ? si_mem_available+0x320/0x320 [ 1917.535799][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.542034][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.548274][T31256] free_pages_check_bad+0x142/0x1a0 [ 1917.553475][T31256] free_unref_page+0x3c6/0x600 [ 1917.558239][T31256] __put_page+0x8d/0xd0 [ 1917.562391][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1917.568208][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1917.573575][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1917.578776][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1917.584769][T31256] ? rw_verify_area+0x118/0x360 [ 1917.589618][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1917.595594][T31256] direct_splice_actor+0x126/0x1a0 [ 1917.600702][T31256] splice_direct_to_actor+0x369/0x970 [ 1917.606072][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1917.611616][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1917.617849][T31256] ? do_splice_to+0x190/0x190 [ 1917.622527][T31256] ? rw_verify_area+0x118/0x360 [ 1917.627376][T31256] do_splice_direct+0x1da/0x2a0 [ 1917.632236][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1917.637785][T31256] ? rw_verify_area+0x118/0x360 [ 1917.642636][T31256] do_sendfile+0x597/0xd00 [ 1917.647058][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1917.652339][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1917.658590][T31256] ? put_timespec64+0xda/0x140 [ 1917.663361][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1917.668561][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1917.673843][T31256] ? do_syscall_64+0x26/0x610 [ 1917.678517][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1917.683802][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1917.688825][T31256] do_syscall_64+0x103/0x610 [ 1917.693430][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1917.699315][T31256] RIP: 0033:0x457e29 [ 1917.703207][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1917.722814][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1917.731230][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1917.739196][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1917.747160][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1917.755122][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1917.763084][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1917.842532][T31256] Disabling lock debugging due to kernel taint [ 1917.852452][T31256] BUG: Bad page state in process syz-executor.0 pfn:75689 [ 1917.861225][T31256] page:ffffea0001d5a240 count:0 mapcount:0 mapping:ffff888086974d40 index:0x1 [ 1917.871818][T31256] shmem_aops [ 1917.871824][T31256] name:"memfd:}#*nodevem2N," [ 1917.875208][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1917.890730][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1917.899613][T31256] raw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000 [ 1917.911340][T31256] page dumped because: non-NULL mapping [ 1917.917170][T31256] Modules linked in: [ 1917.921187][T31256] CPU: 0 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1917.931688][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1917.941727][T31256] Call Trace: [ 1917.945017][T31256] dump_stack+0x172/0x1f0 [ 1917.949347][T31256] bad_page.cold+0xda/0xff [ 1917.953760][T31256] ? si_mem_available+0x320/0x320 [ 1917.958785][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1917.963804][T31256] ? kasan_check_read+0x11/0x20 [ 1917.968651][T31256] free_pages_check_bad+0x142/0x1a0 [ 1917.973844][T31256] free_unref_page+0x3c6/0x600 [ 1917.978607][T31256] __put_page+0x8d/0xd0 [ 1917.982763][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1917.988566][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1917.993931][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1917.999159][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1918.005147][T31256] ? rw_verify_area+0x118/0x360 [ 1918.009992][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1918.015969][T31256] direct_splice_actor+0x126/0x1a0 [ 1918.021082][T31256] splice_direct_to_actor+0x369/0x970 [ 1918.026454][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1918.032000][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.038238][T31256] ? do_splice_to+0x190/0x190 [ 1918.042919][T31256] ? rw_verify_area+0x118/0x360 [ 1918.047768][T31256] do_splice_direct+0x1da/0x2a0 [ 1918.052616][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1918.058653][T31256] ? rw_verify_area+0x118/0x360 [ 1918.063506][T31256] do_sendfile+0x597/0xd00 [ 1918.067929][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1918.073208][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1918.079450][T31256] ? put_timespec64+0xda/0x140 [ 1918.084225][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1918.089431][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1918.094713][T31256] ? do_syscall_64+0x26/0x610 [ 1918.099385][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1918.104680][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1918.109699][T31256] do_syscall_64+0x103/0x610 [ 1918.114285][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.120178][T31256] RIP: 0033:0x457e29 [ 1918.124070][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1918.143664][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1918.152074][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1918.160054][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1918.168020][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1918.175984][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1918.183947][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1918.199804][T31256] BUG: Bad page state in process syz-executor.0 pfn:6abd9 [ 1918.208632][T31256] page:ffffea0001aaf640 count:0 mapcount:0 mapping:ffff888086974d40 index:0x2 [ 1918.218632][T31256] shmem_aops [ 1918.218639][T31256] name:"memfd:}#*nodevem2N," [ 1918.221930][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1918.237146][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1918.246424][T31256] raw: 0000000000000002 0000000000000000 00000000ffffffff 0000000000000000 [ 1918.255002][T31256] page dumped because: non-NULL mapping [ 1918.262779][T31256] Modules linked in: [ 1918.267269][T31256] CPU: 0 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1918.277759][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1918.287803][T31256] Call Trace: [ 1918.291096][T31256] dump_stack+0x172/0x1f0 [ 1918.295445][T31256] bad_page.cold+0xda/0xff [ 1918.299859][T31256] ? si_mem_available+0x320/0x320 [ 1918.304881][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1918.309900][T31256] ? kasan_check_read+0x11/0x20 [ 1918.314752][T31256] free_pages_check_bad+0x142/0x1a0 [ 1918.319947][T31256] free_unref_page+0x3c6/0x600 [ 1918.324712][T31256] __put_page+0x8d/0xd0 [ 1918.328870][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1918.334670][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1918.340037][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1918.345239][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1918.351223][T31256] ? rw_verify_area+0x118/0x360 [ 1918.356074][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1918.362053][T31256] direct_splice_actor+0x126/0x1a0 [ 1918.367196][T31256] splice_direct_to_actor+0x369/0x970 [ 1918.372566][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1918.378109][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.384349][T31256] ? do_splice_to+0x190/0x190 [ 1918.389023][T31256] ? rw_verify_area+0x118/0x360 [ 1918.393877][T31256] do_splice_direct+0x1da/0x2a0 [ 1918.398726][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1918.404276][T31256] ? rw_verify_area+0x118/0x360 [ 1918.409126][T31256] do_sendfile+0x597/0xd00 [ 1918.413545][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1918.418830][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1918.425066][T31256] ? put_timespec64+0xda/0x140 [ 1918.429835][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1918.435035][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1918.440319][T31256] ? do_syscall_64+0x26/0x610 [ 1918.444992][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1918.450275][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1918.455298][T31256] do_syscall_64+0x103/0x610 [ 1918.459887][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.465774][T31256] RIP: 0033:0x457e29 [ 1918.469670][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1918.489276][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 23:50:13 executing program 2: socket(0x10, 0x80803, 0x7) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f00000000c0), 0xe) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 23:50:13 executing program 3: stat(0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7065726d68617420c5c2e54f8564455d9c75cf4fde8d3078303030"], 0x1) 23:50:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 23:50:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000240)={0x15, "669855b3d925e5abc9f23d582dac7e44cb07916204ee28af7fc204fb88440f7e331c845acef834c77fcb15ac5df551e3e1420fb7316ea93a263b1040a71142efcbc446c823990077eb5b71f17842b0ca12f4bf35d4a23b32b14c20689a4f6f3935070457d8a42f66ba25251d0d33f0e83d5aab2164e64b1b883da159dda07cea"}) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x800000000000004) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r1, 0x0) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80800) bind$inet(r3, 0x0, 0x27) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000680)={{0x2, 0x4e24, @multicast1}, {0x1, @random="9f20ec5ca5b8"}, 0x43, {0x2, 0x4e22, @remote}, 'gre0\x00'}) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) r4 = accept4(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000480)=0x1e5, 0x320) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000640)=0x9, 0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000300)={r1}) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000340), &(0x7f00000003c0)=0x4) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = epoll_create(0x9fa3) recvfrom$llc(r5, 0x0, 0x0, 0x40012100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000100)={0x60000008}) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f00000004c0), &(0x7f0000000540)=0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) epoll_wait(r7, &(0x7f00000005c0)=[{}], 0xb1, 0xda) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x803, 0x3) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x40, 0x200003, 0x7ff}, 0x10) connect$llc(r2, &(0x7f0000000140)={0x1a, 0x300, 0x7, 0x9, 0xfffffffffffffffc, 0x3}, 0x10) socket$isdn(0x22, 0x3, 0x33) 23:50:13 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 1918.497684][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1918.505658][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1918.513626][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1918.521592][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1918.521601][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1918.539993][T31256] BUG: Bad page state in process syz-executor.0 pfn:6af7c [ 1918.581061][T31256] page:ffffea0001abdf00 count:0 mapcount:0 mapping:ffff888086974d40 index:0x3 [ 1918.590492][T31264] bond0: Releasing backup interface bond_slave_1 [ 1918.603811][T31256] shmem_aops [ 1918.603818][T31256] name:"memfd:}#*nodevem2N," [ 1918.609840][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) 23:50:13 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) [ 1918.630552][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1918.650658][T31256] raw: 0000000000000003 0000000000000000 00000000ffffffff 0000000000000000 [ 1918.685178][T31256] page dumped because: non-NULL mapping [ 1918.691889][T31256] Modules linked in: [ 1918.703443][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1918.713950][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1918.724001][T31256] Call Trace: [ 1918.727298][T31256] dump_stack+0x172/0x1f0 [ 1918.731630][T31256] bad_page.cold+0xda/0xff [ 1918.731659][T31256] ? si_mem_available+0x320/0x320 [ 1918.741082][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1918.741863][T31423] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1918.746108][T31256] ? kasan_check_read+0x11/0x20 [ 1918.746128][T31256] free_pages_check_bad+0x142/0x1a0 [ 1918.746145][T31256] free_unref_page+0x3c6/0x600 [ 1918.746171][T31256] __put_page+0x8d/0xd0 [ 1918.746189][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1918.746205][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1918.746219][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1918.746240][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1918.746267][T31256] ? rw_verify_area+0x118/0x360 [ 1918.746281][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1918.746301][T31256] direct_splice_actor+0x126/0x1a0 [ 1918.811567][T31256] splice_direct_to_actor+0x369/0x970 [ 1918.816938][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1918.822480][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1918.828724][T31256] ? do_splice_to+0x190/0x190 [ 1918.833380][T31256] ? rw_verify_area+0x118/0x360 [ 1918.838219][T31256] do_splice_direct+0x1da/0x2a0 [ 1918.843046][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1918.848570][T31256] ? rw_verify_area+0x118/0x360 [ 1918.853397][T31256] do_sendfile+0x597/0xd00 [ 1918.857809][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1918.863070][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1918.869289][T31256] ? put_timespec64+0xda/0x140 [ 1918.874033][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1918.879212][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1918.884476][T31256] ? do_syscall_64+0x26/0x610 [ 1918.889136][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1918.894398][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1918.899429][T31256] do_syscall_64+0x103/0x610 [ 1918.904006][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1918.909872][T31256] RIP: 0033:0x457e29 [ 1918.913743][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1918.933325][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1918.941716][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1918.949667][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1918.957625][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1918.965585][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1918.973544][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1918.995569][T31256] BUG: Bad page state in process syz-executor.0 pfn:6a7d9 [ 1919.012490][T31256] page:ffffea0001a9f640 count:0 mapcount:0 mapping:ffff888086974d40 index:0x4 [ 1919.021495][T31256] shmem_aops [ 1919.021502][T31256] name:"memfd:}#*nodevem2N," [ 1919.024866][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1919.037489][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1919.046220][T31256] raw: 0000000000000004 0000000000000000 00000000ffffffff 0000000000000000 [ 1919.046227][T31256] page dumped because: non-NULL mapping [ 1919.046231][T31256] Modules linked in: [ 1919.046252][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1919.046267][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.084756][T31256] Call Trace: [ 1919.088029][T31256] dump_stack+0x172/0x1f0 [ 1919.092337][T31256] bad_page.cold+0xda/0xff [ 1919.096738][T31256] ? si_mem_available+0x320/0x320 [ 1919.101754][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1919.106758][T31256] ? kasan_check_read+0x11/0x20 [ 1919.111586][T31256] free_pages_check_bad+0x142/0x1a0 [ 1919.116774][T31256] free_unref_page+0x3c6/0x600 [ 1919.121525][T31256] __put_page+0x8d/0xd0 [ 1919.125662][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1919.131444][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1919.136820][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1919.142006][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1919.147968][T31256] ? rw_verify_area+0x118/0x360 [ 1919.152796][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1919.158771][T31256] direct_splice_actor+0x126/0x1a0 [ 1919.163858][T31256] splice_direct_to_actor+0x369/0x970 [ 1919.169207][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1919.174729][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.180960][T31256] ? do_splice_to+0x190/0x190 [ 1919.185622][T31256] ? rw_verify_area+0x118/0x360 [ 1919.190452][T31256] do_splice_direct+0x1da/0x2a0 [ 1919.195303][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1919.200841][T31256] ? rw_verify_area+0x118/0x360 [ 1919.205670][T31256] do_sendfile+0x597/0xd00 [ 1919.210067][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1919.215338][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.221566][T31256] ? put_timespec64+0xda/0x140 [ 1919.226309][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1919.231487][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1919.236764][T31256] ? do_syscall_64+0x26/0x610 [ 1919.241437][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1919.246700][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1919.251719][T31256] do_syscall_64+0x103/0x610 [ 1919.256298][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.262176][T31256] RIP: 0033:0x457e29 [ 1919.266049][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.285634][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1919.294024][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1919.301975][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1919.309945][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1919.317897][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1919.325848][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1919.334079][T31256] BUG: Bad page state in process syz-executor.0 pfn:813f4 [ 1919.341316][T31256] page:ffffea000204fd00 count:0 mapcount:0 mapping:ffff888086974d40 index:0x5 [ 1919.350271][T31256] shmem_aops [ 1919.350277][T31256] name:"memfd:}#*nodevem2N," [ 1919.353564][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1919.366034][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1919.374601][T31256] raw: 0000000000000005 0000000000000000 00000000ffffffff 0000000000000000 [ 1919.383266][T31256] page dumped because: non-NULL mapping [ 1919.388828][T31256] Modules linked in: [ 1919.392707][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1919.403179][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.413208][T31256] Call Trace: [ 1919.416493][T31256] dump_stack+0x172/0x1f0 [ 1919.420835][T31256] bad_page.cold+0xda/0xff [ 1919.425228][T31256] ? si_mem_available+0x320/0x320 [ 1919.430240][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1919.435260][T31256] ? kasan_check_read+0x11/0x20 [ 1919.440158][T31256] free_pages_check_bad+0x142/0x1a0 [ 1919.445364][T31256] free_unref_page+0x3c6/0x600 [ 1919.450106][T31256] __put_page+0x8d/0xd0 [ 1919.454241][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1919.460025][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1919.465385][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1919.470585][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1919.476559][T31256] ? rw_verify_area+0x118/0x360 [ 1919.481425][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1919.487400][T31256] direct_splice_actor+0x126/0x1a0 [ 1919.492515][T31256] splice_direct_to_actor+0x369/0x970 [ 1919.497879][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1919.503419][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.509639][T31256] ? do_splice_to+0x190/0x190 [ 1919.514294][T31256] ? rw_verify_area+0x118/0x360 [ 1919.519125][T31256] do_splice_direct+0x1da/0x2a0 [ 1919.523958][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1919.529487][T31256] ? rw_verify_area+0x118/0x360 [ 1919.534314][T31256] do_sendfile+0x597/0xd00 [ 1919.538713][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1919.543974][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.550190][T31256] ? put_timespec64+0xda/0x140 [ 1919.554958][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1919.560135][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1919.565424][T31256] ? do_syscall_64+0x26/0x610 [ 1919.570083][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1919.575354][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1919.580385][T31256] do_syscall_64+0x103/0x610 [ 1919.584966][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.590841][T31256] RIP: 0033:0x457e29 [ 1919.594720][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.614296][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1919.622684][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1919.630630][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1919.638579][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1919.646525][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1919.654498][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1919.662760][T31256] BUG: Bad page state in process syz-executor.0 pfn:7eaf3 [ 1919.669979][T31256] page:ffffea0001fabcc0 count:0 mapcount:0 mapping:ffff888086974d40 index:0x6 [ 1919.678902][T31256] shmem_aops [ 1919.678909][T31256] name:"memfd:}#*nodevem2N," [ 1919.682210][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1919.694659][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1919.703272][T31256] raw: 0000000000000006 0000000000000000 00000000ffffffff 0000000000000000 [ 1919.711899][T31256] page dumped because: non-NULL mapping [ 1919.717487][T31256] Modules linked in: [ 1919.721383][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1919.731854][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1919.741882][T31256] Call Trace: [ 1919.745154][T31256] dump_stack+0x172/0x1f0 [ 1919.749483][T31256] bad_page.cold+0xda/0xff [ 1919.753892][T31256] ? si_mem_available+0x320/0x320 [ 1919.758902][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1919.763912][T31256] ? kasan_check_read+0x11/0x20 [ 1919.768762][T31256] free_pages_check_bad+0x142/0x1a0 [ 1919.773953][T31256] free_unref_page+0x3c6/0x600 [ 1919.778704][T31256] __put_page+0x8d/0xd0 [ 1919.782837][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1919.788618][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1919.793965][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1919.799157][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1919.805126][T31256] ? rw_verify_area+0x118/0x360 [ 1919.809953][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1919.815926][T31256] direct_splice_actor+0x126/0x1a0 [ 1919.821050][T31256] splice_direct_to_actor+0x369/0x970 [ 1919.826448][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1919.831974][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1919.838190][T31256] ? do_splice_to+0x190/0x190 [ 1919.842843][T31256] ? rw_verify_area+0x118/0x360 [ 1919.847670][T31256] do_splice_direct+0x1da/0x2a0 [ 1919.852506][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1919.858030][T31256] ? rw_verify_area+0x118/0x360 [ 1919.862860][T31256] do_sendfile+0x597/0xd00 [ 1919.867255][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1919.872519][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1919.878746][T31256] ? put_timespec64+0xda/0x140 [ 1919.883511][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1919.888688][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1919.893955][T31256] ? do_syscall_64+0x26/0x610 [ 1919.898623][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1919.903893][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1919.908900][T31256] do_syscall_64+0x103/0x610 [ 1919.913474][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1919.919343][T31256] RIP: 0033:0x457e29 [ 1919.923214][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1919.942806][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1919.951192][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1919.959154][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1919.967102][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1919.975050][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1919.982998][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1919.992809][T31256] BUG: Bad page state in process syz-executor.0 pfn:6e7f0 [ 1920.000067][T31256] page:ffffea0001b9fc00 count:0 mapcount:0 mapping:ffff888086974d40 index:0x7 [ 1920.009024][T31256] shmem_aops [ 1920.009043][T31256] name:"memfd:}#*nodevem2N," [ 1920.012327][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1920.024799][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1920.033434][T31256] raw: 0000000000000007 0000000000000000 00000000ffffffff 0000000000000000 [ 1920.042127][T31256] page dumped because: non-NULL mapping [ 1920.047702][T31256] Modules linked in: [ 1920.051626][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1920.062303][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.072335][T31256] Call Trace: [ 1920.075620][T31256] dump_stack+0x172/0x1f0 [ 1920.079973][T31256] bad_page.cold+0xda/0xff [ 1920.084382][T31256] ? si_mem_available+0x320/0x320 [ 1920.089393][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1920.094414][T31256] ? kasan_check_read+0x11/0x20 [ 1920.099248][T31256] free_pages_check_bad+0x142/0x1a0 [ 1920.104448][T31256] free_unref_page+0x3c6/0x600 [ 1920.109192][T31256] __put_page+0x8d/0xd0 [ 1920.113331][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1920.119114][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1920.124465][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1920.129644][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1920.135624][T31256] ? rw_verify_area+0x118/0x360 [ 1920.140475][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1920.146442][T31256] direct_splice_actor+0x126/0x1a0 [ 1920.151534][T31256] splice_direct_to_actor+0x369/0x970 [ 1920.156894][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1920.162439][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.168658][T31256] ? do_splice_to+0x190/0x190 [ 1920.173320][T31256] ? rw_verify_area+0x118/0x360 [ 1920.178147][T31256] do_splice_direct+0x1da/0x2a0 [ 1920.182985][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1920.188514][T31256] ? rw_verify_area+0x118/0x360 [ 1920.193357][T31256] do_sendfile+0x597/0xd00 [ 1920.197757][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1920.203021][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.209238][T31256] ? put_timespec64+0xda/0x140 [ 1920.214001][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1920.219181][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1920.224445][T31256] ? do_syscall_64+0x26/0x610 [ 1920.229098][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1920.234366][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1920.239371][T31256] do_syscall_64+0x103/0x610 [ 1920.243946][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.249828][T31256] RIP: 0033:0x457e29 [ 1920.253699][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.273293][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1920.281680][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1920.289625][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1920.298106][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1920.306052][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1920.313998][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1920.322127][T31256] BUG: Bad page state in process syz-executor.0 pfn:6893e [ 1920.329358][T31256] page:ffffea0001a24f80 count:0 mapcount:0 mapping:ffff888086974d40 index:0x8 [ 1920.338384][T31256] shmem_aops [ 1920.338391][T31256] name:"memfd:}#*nodevem2N," [ 1920.341680][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1920.354109][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1920.363197][T31256] raw: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 1920.371900][T31256] page dumped because: non-NULL mapping [ 1920.377501][T31256] Modules linked in: [ 1920.381396][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1920.391889][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.401924][T31256] Call Trace: [ 1920.405194][T31256] dump_stack+0x172/0x1f0 [ 1920.409510][T31256] bad_page.cold+0xda/0xff [ 1920.413931][T31256] ? si_mem_available+0x320/0x320 [ 1920.418939][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1920.423943][T31256] ? kasan_check_read+0x11/0x20 [ 1920.428777][T31256] free_pages_check_bad+0x142/0x1a0 [ 1920.433950][T31256] free_unref_page+0x3c6/0x600 [ 1920.438692][T31256] __put_page+0x8d/0xd0 [ 1920.442826][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1920.448607][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1920.453953][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1920.459146][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1920.465110][T31256] ? rw_verify_area+0x118/0x360 [ 1920.469940][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1920.475936][T31256] direct_splice_actor+0x126/0x1a0 [ 1920.481038][T31256] splice_direct_to_actor+0x369/0x970 [ 1920.486388][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1920.491917][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.498135][T31256] ? do_splice_to+0x190/0x190 [ 1920.502802][T31256] ? rw_verify_area+0x118/0x360 [ 1920.507630][T31256] do_splice_direct+0x1da/0x2a0 [ 1920.512456][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1920.517980][T31256] ? rw_verify_area+0x118/0x360 [ 1920.522824][T31256] do_sendfile+0x597/0xd00 [ 1920.527222][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1920.532481][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.538697][T31256] ? put_timespec64+0xda/0x140 [ 1920.543444][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1920.548621][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1920.553881][T31256] ? do_syscall_64+0x26/0x610 [ 1920.558536][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1920.563799][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1920.568803][T31256] do_syscall_64+0x103/0x610 [ 1920.573372][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.579238][T31256] RIP: 0033:0x457e29 [ 1920.583108][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.602686][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1920.611070][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1920.619017][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1920.626965][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1920.634912][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1920.642864][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1920.651130][T31256] BUG: Bad page state in process syz-executor.0 pfn:6a676 [ 1920.658350][T31256] page:ffffea0001a99d80 count:0 mapcount:0 mapping:ffff888086974d40 index:0x9 [ 1920.667278][T31256] shmem_aops [ 1920.667285][T31256] name:"memfd:}#*nodevem2N," [ 1920.670567][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1920.683018][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1920.691646][T31256] raw: 0000000000000009 0000000000000000 00000000ffffffff 0000000000000000 [ 1920.700295][T31256] page dumped because: non-NULL mapping [ 1920.705848][T31256] Modules linked in: [ 1920.709725][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1920.720187][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1920.730231][T31256] Call Trace: [ 1920.733502][T31256] dump_stack+0x172/0x1f0 [ 1920.737814][T31256] bad_page.cold+0xda/0xff [ 1920.742210][T31256] ? si_mem_available+0x320/0x320 [ 1920.747212][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1920.752213][T31256] ? kasan_check_read+0x11/0x20 [ 1920.757051][T31256] free_pages_check_bad+0x142/0x1a0 [ 1920.762236][T31256] free_unref_page+0x3c6/0x600 [ 1920.766978][T31256] __put_page+0x8d/0xd0 [ 1920.771114][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1920.776906][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1920.782269][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1920.787447][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1920.793414][T31256] ? rw_verify_area+0x118/0x360 [ 1920.798244][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1920.804213][T31256] direct_splice_actor+0x126/0x1a0 [ 1920.809300][T31256] splice_direct_to_actor+0x369/0x970 [ 1920.814648][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1920.820181][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1920.826397][T31256] ? do_splice_to+0x190/0x190 [ 1920.831056][T31256] ? rw_verify_area+0x118/0x360 [ 1920.835892][T31256] do_splice_direct+0x1da/0x2a0 [ 1920.840735][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1920.846261][T31256] ? rw_verify_area+0x118/0x360 [ 1920.851088][T31256] do_sendfile+0x597/0xd00 [ 1920.855501][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1920.860772][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1920.866988][T31256] ? put_timespec64+0xda/0x140 [ 1920.871731][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1920.876941][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1920.882237][T31256] ? do_syscall_64+0x26/0x610 [ 1920.886889][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1920.892181][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1920.897194][T31256] do_syscall_64+0x103/0x610 [ 1920.901771][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1920.907635][T31256] RIP: 0033:0x457e29 [ 1920.911507][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1920.931086][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1920.939474][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1920.947426][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1920.955381][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1920.963347][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1920.971293][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1920.979442][T31256] BUG: Bad page state in process syz-executor.0 pfn:70dc8 [ 1920.986660][T31256] page:ffffea0001c37200 count:0 mapcount:0 mapping:ffff888086974d40 index:0xa [ 1920.995801][T31256] shmem_aops [ 1920.995808][T31256] name:"memfd:}#*nodevem2N," [ 1920.999092][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1921.011544][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1921.020150][T31256] raw: 000000000000000a 0000000000000000 00000000ffffffff 0000000000000000 [ 1921.028807][T31256] page dumped because: non-NULL mapping [ 1921.034339][T31256] Modules linked in: [ 1921.038263][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1921.048753][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.058783][T31256] Call Trace: [ 1921.062077][T31256] dump_stack+0x172/0x1f0 [ 1921.066439][T31256] bad_page.cold+0xda/0xff [ 1921.070878][T31256] ? si_mem_available+0x320/0x320 [ 1921.075893][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1921.080914][T31256] ? kasan_check_read+0x11/0x20 [ 1921.085749][T31256] free_pages_check_bad+0x142/0x1a0 [ 1921.090929][T31256] free_unref_page+0x3c6/0x600 [ 1921.095695][T31256] __put_page+0x8d/0xd0 [ 1921.099843][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1921.105624][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1921.111009][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1921.116213][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1921.122185][T31256] ? rw_verify_area+0x118/0x360 [ 1921.127011][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1921.132966][T31256] direct_splice_actor+0x126/0x1a0 [ 1921.138054][T31256] splice_direct_to_actor+0x369/0x970 [ 1921.143418][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1921.148967][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.155179][T31256] ? do_splice_to+0x190/0x190 [ 1921.159835][T31256] ? rw_verify_area+0x118/0x360 [ 1921.164662][T31256] do_splice_direct+0x1da/0x2a0 [ 1921.169488][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1921.175009][T31256] ? rw_verify_area+0x118/0x360 [ 1921.179837][T31256] do_sendfile+0x597/0xd00 [ 1921.184246][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1921.189513][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.195738][T31256] ? put_timespec64+0xda/0x140 [ 1921.200509][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1921.205685][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1921.210944][T31256] ? do_syscall_64+0x26/0x610 [ 1921.215608][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1921.220897][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1921.225903][T31256] do_syscall_64+0x103/0x610 [ 1921.230478][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.236343][T31256] RIP: 0033:0x457e29 [ 1921.240220][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.259795][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1921.268178][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1921.276143][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1921.284103][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1921.292048][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1921.299991][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1921.308265][T31256] BUG: Bad page state in process syz-executor.0 pfn:73560 [ 1921.315502][T31256] page:ffffea0001cd5800 count:0 mapcount:0 mapping:ffff888086974d40 index:0xb [ 1921.324425][T31256] shmem_aops [ 1921.324429][T31256] name:"memfd:}#*nodevem2N," [ 1921.327759][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1921.340175][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1921.348795][T31256] raw: 000000000000000b 0000000000000000 00000000ffffffff 0000000000000000 [ 1921.357447][T31256] page dumped because: non-NULL mapping [ 1921.362967][T31256] Modules linked in: [ 1921.366909][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1921.377403][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.387438][T31256] Call Trace: [ 1921.390725][T31256] dump_stack+0x172/0x1f0 [ 1921.395034][T31256] bad_page.cold+0xda/0xff [ 1921.399441][T31256] ? si_mem_available+0x320/0x320 [ 1921.404445][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1921.409450][T31256] ? kasan_check_read+0x11/0x20 [ 1921.414291][T31256] free_pages_check_bad+0x142/0x1a0 [ 1921.419467][T31256] free_unref_page+0x3c6/0x600 [ 1921.424208][T31256] __put_page+0x8d/0xd0 [ 1921.428340][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1921.434123][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1921.439476][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1921.444651][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1921.450610][T31256] ? rw_verify_area+0x118/0x360 [ 1921.455440][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1921.461397][T31256] direct_splice_actor+0x126/0x1a0 [ 1921.466493][T31256] splice_direct_to_actor+0x369/0x970 [ 1921.471862][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1921.477391][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.483613][T31256] ? do_splice_to+0x190/0x190 [ 1921.488265][T31256] ? rw_verify_area+0x118/0x360 [ 1921.493089][T31256] do_splice_direct+0x1da/0x2a0 [ 1921.497938][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1921.503463][T31256] ? rw_verify_area+0x118/0x360 [ 1921.508289][T31256] do_sendfile+0x597/0xd00 [ 1921.512698][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1921.517961][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.524176][T31256] ? put_timespec64+0xda/0x140 [ 1921.528924][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1921.534100][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1921.539362][T31256] ? do_syscall_64+0x26/0x610 [ 1921.544028][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1921.549304][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1921.554565][T31256] do_syscall_64+0x103/0x610 [ 1921.559132][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.564997][T31256] RIP: 0033:0x457e29 [ 1921.568866][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.588445][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1921.596836][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1921.604782][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1921.612726][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1921.620674][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1921.628619][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1921.636860][T31256] BUG: Bad page state in process syz-executor.0 pfn:6e7f3 [ 1921.644059][T31256] page:ffffea0001b9fcc0 count:0 mapcount:0 mapping:ffff888086974d40 index:0xc [ 1921.652984][T31256] shmem_aops [ 1921.652990][T31256] name:"memfd:}#*nodevem2N," [ 1921.656297][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1921.669423][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1921.678068][T31256] raw: 000000000000000c 0000000000000000 00000000ffffffff 0000000000000000 [ 1921.686742][T31256] page dumped because: non-NULL mapping [ 1921.692300][T31256] Modules linked in: [ 1921.696243][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1921.706730][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1921.716769][T31256] Call Trace: [ 1921.720056][T31256] dump_stack+0x172/0x1f0 [ 1921.724391][T31256] bad_page.cold+0xda/0xff [ 1921.728821][T31256] ? si_mem_available+0x320/0x320 [ 1921.733844][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1921.738863][T31256] ? kasan_check_read+0x11/0x20 [ 1921.743706][T31256] free_pages_check_bad+0x142/0x1a0 [ 1921.748901][T31256] free_unref_page+0x3c6/0x600 [ 1921.753667][T31256] __put_page+0x8d/0xd0 [ 1921.757815][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1921.763613][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1921.768975][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1921.774178][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1921.780161][T31256] ? rw_verify_area+0x118/0x360 [ 1921.785004][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1921.790973][T31256] direct_splice_actor+0x126/0x1a0 [ 1921.796078][T31256] splice_direct_to_actor+0x369/0x970 [ 1921.801446][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1921.806990][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1921.813218][T31256] ? do_splice_to+0x190/0x190 [ 1921.817892][T31256] ? rw_verify_area+0x118/0x360 [ 1921.822737][T31256] do_splice_direct+0x1da/0x2a0 [ 1921.827582][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1921.833124][T31256] ? rw_verify_area+0x118/0x360 [ 1921.837967][T31256] do_sendfile+0x597/0xd00 [ 1921.842383][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1921.847667][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1921.853901][T31256] ? put_timespec64+0xda/0x140 [ 1921.858669][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1921.863862][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1921.869137][T31256] ? do_syscall_64+0x26/0x610 [ 1921.873805][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1921.879085][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1921.884129][T31256] do_syscall_64+0x103/0x610 [ 1921.888730][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1921.894609][T31256] RIP: 0033:0x457e29 [ 1921.898498][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1921.918180][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1921.926582][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1921.934546][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1921.942505][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1921.950465][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1921.958432][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1921.968037][T31256] BUG: Bad page state in process syz-executor.0 pfn:6ab6e [ 1921.975697][T31256] page:ffffea0001aadb80 count:0 mapcount:0 mapping:ffff888086974d40 index:0xd [ 1921.984859][T31256] shmem_aops [ 1921.984865][T31256] name:"memfd:}#*nodevem2N," [ 1921.988407][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1922.001590][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1922.010196][T31256] raw: 000000000000000d 0000000000000000 00000000ffffffff 0000000000000000 [ 1922.018851][T31256] page dumped because: non-NULL mapping [ 1922.024384][T31256] Modules linked in: [ 1922.028338][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1922.038833][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.048860][T31256] Call Trace: [ 1922.052130][T31256] dump_stack+0x172/0x1f0 [ 1922.056574][T31256] bad_page.cold+0xda/0xff [ 1922.060968][T31256] ? si_mem_available+0x320/0x320 [ 1922.065972][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1922.070974][T31256] ? kasan_check_read+0x11/0x20 [ 1922.075802][T31256] free_pages_check_bad+0x142/0x1a0 [ 1922.080973][T31256] free_unref_page+0x3c6/0x600 [ 1922.085726][T31256] __put_page+0x8d/0xd0 [ 1922.089888][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1922.095705][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1922.101068][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1922.106243][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1922.112205][T31256] ? rw_verify_area+0x118/0x360 [ 1922.117029][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1922.122982][T31256] direct_splice_actor+0x126/0x1a0 [ 1922.128071][T31256] splice_direct_to_actor+0x369/0x970 [ 1922.133428][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1922.138954][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.145170][T31256] ? do_splice_to+0x190/0x190 [ 1922.149822][T31256] ? rw_verify_area+0x118/0x360 [ 1922.154680][T31256] do_splice_direct+0x1da/0x2a0 [ 1922.159517][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1922.165053][T31256] ? rw_verify_area+0x118/0x360 [ 1922.169880][T31256] do_sendfile+0x597/0xd00 [ 1922.174277][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1922.179534][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.185759][T31256] ? put_timespec64+0xda/0x140 [ 1922.190729][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1922.195904][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1922.201168][T31256] ? do_syscall_64+0x26/0x610 [ 1922.205823][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1922.211082][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1922.216083][T31256] do_syscall_64+0x103/0x610 [ 1922.220648][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.226515][T31256] RIP: 0033:0x457e29 [ 1922.230384][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.249966][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1922.258351][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1922.266295][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1922.274240][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1922.282198][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1922.290144][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1922.298583][T31256] BUG: Bad page state in process syz-executor.0 pfn:7f2db [ 1922.305834][T31256] page:ffffea0001fcb6c0 count:0 mapcount:0 mapping:ffff888086974d40 index:0xe [ 1922.314721][T31256] shmem_aops [ 1922.314725][T31256] name:"memfd:}#*nodevem2N," [ 1922.318068][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1922.330501][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1922.339117][T31256] raw: 000000000000000e 0000000000000000 00000000ffffffff 0000000000000000 [ 1922.347779][T31256] page dumped because: non-NULL mapping [ 1922.353299][T31256] Modules linked in: [ 1922.358169][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1922.368649][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.378675][T31256] Call Trace: [ 1922.381946][T31256] dump_stack+0x172/0x1f0 [ 1922.386256][T31256] bad_page.cold+0xda/0xff [ 1922.390654][T31256] ? si_mem_available+0x320/0x320 [ 1922.395657][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1922.400684][T31256] ? kasan_check_read+0x11/0x20 [ 1922.405511][T31256] free_pages_check_bad+0x142/0x1a0 [ 1922.410682][T31256] free_unref_page+0x3c6/0x600 [ 1922.415431][T31256] __put_page+0x8d/0xd0 [ 1922.419566][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1922.425354][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1922.430699][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1922.435873][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1922.441833][T31256] ? rw_verify_area+0x118/0x360 [ 1922.446657][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1922.452609][T31256] direct_splice_actor+0x126/0x1a0 [ 1922.457696][T31256] splice_direct_to_actor+0x369/0x970 [ 1922.463046][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1922.468570][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.474787][T31256] ? do_splice_to+0x190/0x190 [ 1922.479445][T31256] ? rw_verify_area+0x118/0x360 [ 1922.484277][T31256] do_splice_direct+0x1da/0x2a0 [ 1922.489118][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1922.494639][T31256] ? rw_verify_area+0x118/0x360 [ 1922.499480][T31256] do_sendfile+0x597/0xd00 [ 1922.503879][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1922.509141][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.515356][T31256] ? put_timespec64+0xda/0x140 [ 1922.520100][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1922.525284][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1922.530552][T31256] ? do_syscall_64+0x26/0x610 [ 1922.535205][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1922.540466][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1922.545466][T31256] do_syscall_64+0x103/0x610 [ 1922.550034][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.555913][T31256] RIP: 0033:0x457e29 [ 1922.559787][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.579378][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1922.587761][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1922.595708][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1922.603658][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1922.611617][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1922.619562][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff [ 1922.627778][T31256] BUG: Bad page state in process syz-executor.0 pfn:6c0f7 [ 1922.634978][T31256] page:ffffea0001b03dc0 count:0 mapcount:0 mapping:ffff888086974d40 index:0xf [ 1922.643907][T31256] shmem_aops [ 1922.643913][T31256] name:"memfd:}#*nodevem2N," [ 1922.647230][T31256] flags: 0x1fffc000008000e(referenced|uptodate|dirty|swapbacked) [ 1922.659689][T31256] raw: 01fffc000008000e dead000000000100 dead000000000200 ffff888086974d40 [ 1922.668292][T31256] raw: 000000000000000f 0000000000000000 00000000ffffffff 0000000000000000 [ 1922.676960][T31256] page dumped because: non-NULL mapping [ 1922.682495][T31256] Modules linked in: [ 1922.686424][T31256] CPU: 1 PID: 31256 Comm: syz-executor.0 Tainted: G B 5.0.0-rc7-next-20190225 #42 [ 1922.696916][T31256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1922.706948][T31256] Call Trace: [ 1922.710223][T31256] dump_stack+0x172/0x1f0 [ 1922.714530][T31256] bad_page.cold+0xda/0xff [ 1922.718926][T31256] ? si_mem_available+0x320/0x320 [ 1922.723934][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1922.728946][T31256] ? kasan_check_read+0x11/0x20 [ 1922.733774][T31256] free_pages_check_bad+0x142/0x1a0 [ 1922.738948][T31256] free_unref_page+0x3c6/0x600 [ 1922.743696][T31256] __put_page+0x8d/0xd0 [ 1922.747831][T31256] page_cache_pipe_buf_release+0x12b/0x180 [ 1922.753613][T31256] iter_file_splice_write+0x7d1/0xbe0 [ 1922.758974][T31256] ? atime_needs_update+0x5f0/0x5f0 [ 1922.764150][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1922.770110][T31256] ? rw_verify_area+0x118/0x360 [ 1922.774941][T31256] ? page_cache_pipe_buf_confirm+0x2b0/0x2b0 [ 1922.780899][T31256] direct_splice_actor+0x126/0x1a0 [ 1922.785989][T31256] splice_direct_to_actor+0x369/0x970 [ 1922.791333][T31256] ? generic_pipe_buf_nosteal+0x10/0x10 [ 1922.796857][T31256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1922.803068][T31256] ? do_splice_to+0x190/0x190 [ 1922.807717][T31256] ? rw_verify_area+0x118/0x360 [ 1922.812542][T31256] do_splice_direct+0x1da/0x2a0 [ 1922.817382][T31256] ? splice_direct_to_actor+0x970/0x970 [ 1922.822906][T31256] ? rw_verify_area+0x118/0x360 [ 1922.827738][T31256] do_sendfile+0x597/0xd00 [ 1922.832148][T31256] ? do_compat_pwritev64+0x1c0/0x1c0 [ 1922.837416][T31256] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1922.843635][T31256] ? put_timespec64+0xda/0x140 [ 1922.848396][T31256] __x64_sys_sendfile64+0x1dd/0x220 [ 1922.853576][T31256] ? __ia32_sys_sendfile+0x230/0x230 [ 1922.858835][T31256] ? do_syscall_64+0x26/0x610 [ 1922.863486][T31256] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1922.868747][T31256] ? trace_hardirqs_on+0x67/0x230 [ 1922.873759][T31256] do_syscall_64+0x103/0x610 [ 1922.878324][T31256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1922.884189][T31256] RIP: 0033:0x457e29 [ 1922.888059][T31256] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1922.907641][T31256] RSP: 002b:00007f96b2499c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1922.916028][T31256] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457e29 [ 1922.923972][T31256] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000000 [ 1922.931925][T31256] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 1922.939882][T31256] R10: 0000000000080005 R11: 0000000000000246 R12: 00007f96b249a6d4 [ 1922.947831][T31256] R13: 00000000004c4dce R14: 00000000004d8af8 R15: 00000000ffffffff 23:50:17 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x9) setsockopt$inet6_udp_int(r0, 0x11, 0x6f, &(0x7f00000001c0)=0xc7, 0x4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000200)={0x8, {{0xa, 0x4e21, 0x0, @mcast1, 0x1ff}}, 0x0, 0x4, [{{0xa, 0x4e23, 0x2, @remote, 0x3}}, {{0xa, 0x4e20, 0x6, @loopback, 0x4}}, {{0xa, 0x4e24, 0x6, @ipv4, 0x4}}, {{0xa, 0x4e21, 0x5, @empty, 0x400}}]}, 0x290) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r2) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f0000000300)=0x73, 0xff55) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e22, @multicast1}, 0x10) setsockopt$sock_int(r2, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x20003ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = open(&(0x7f0000000500)='./bus\x00', 0x141042, 0x0) close(r3) r4 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x101, 0x105082) r5 = memfd_create(&(0x7f0000000180)='}#*nodevem2N,\x00', 0x0) pwritev(r5, &(0x7f00000000c0)=[{&(0x7f0000000480)="06", 0x1}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x360) fcntl$setstatus(r1, 0x4, 0x4000042800) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r7, &(0x7f00000001c0), 0x526987c9) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) read(r6, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$sock_inet_SIOCRTMSG(r2, 0x890d, &(0x7f0000000780)={0x0, {0x2, 0x4e22, @multicast1}, {0x2, 0x4e23, @loopback}, {0x2, 0x4e22, @remote}, 0x83, 0x0, 0x0, 0x0, 0x9802, 0x0, 0x80000001, 0x0, 0x5}) sendfile(r4, r5, 0x0, 0x80005) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) syz_open_procfs(r8, &(0x7f0000000380)='envh&on\x00') ioctl$sock_SIOCGIFBR(r3, 0x8940, &(0x7f0000000800)=@add_del={0x2, &(0x7f0000000140)='vcan0\x00'}) syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') 23:50:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 23:50:17 executing program 3: stat(0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7065726d68617420c5c2e54f8564455d9c75cf4fde8d3078303030"], 0x1) 23:50:17 executing program 2: socket(0x10, 0x80803, 0x7) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r1, &(0x7f00000000c0), 0xe) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000000), 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) 23:50:17 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000240)={0x15, "669855b3d925e5abc9f23d582dac7e44cb07916204ee28af7fc204fb88440f7e331c845acef834c77fcb15ac5df551e3e1420fb7316ea93a263b1040a71142efcbc446c823990077eb5b71f17842b0ca12f4bf35d4a23b32b14c20689a4f6f3935070457d8a42f66ba25251d0d33f0e83d5aab2164e64b1b883da159dda07cea"}) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x800000000000004) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r1, 0x0) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80800) bind$inet(r3, 0x0, 0x27) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000680)={{0x2, 0x4e24, @multicast1}, {0x1, @random="9f20ec5ca5b8"}, 0x43, {0x2, 0x4e22, @remote}, 'gre0\x00'}) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) r4 = accept4(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000480)=0x1e5, 0x320) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000640)=0x9, 0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000300)={r1}) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000340), &(0x7f00000003c0)=0x4) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = epoll_create(0x9fa3) recvfrom$llc(r5, 0x0, 0x0, 0x40012100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000100)={0x60000008}) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f00000004c0), &(0x7f0000000540)=0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) epoll_wait(r7, &(0x7f00000005c0)=[{}], 0xb1, 0xda) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x803, 0x3) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x40, 0x200003, 0x7ff}, 0x10) connect$llc(r2, &(0x7f0000000140)={0x1a, 0x300, 0x7, 0x9, 0xfffffffffffffffc, 0x3}, 0x10) socket$isdn(0x22, 0x3, 0x33) 23:50:17 executing program 1: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r0, 0xae04) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000002c0)=ANY=[@ANYBLOB="0054b6ecdb6191c88cb8c49194e60000"], 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) sendmsg(r1, &(0x7f0000000300)={&(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x3, 0x4, 0x2, 0x0, {0xa, 0x4e22, 0x40, @loopback, 0x80000001}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000580)="8a6adfaca392caad59d0ee1ba24407a3b7773d6f233d64ac998f9f1c3b6bf7152b52d61be6cbab15064db5d2e7d738dff19038e863d9a7c83cac37db382328aab379fcd82a76c6b54a40962f83b7cd12d72aee57c0265f671b76278d588ce2a2ff32c2c6600a8f95c9fb3c88f6e0ab599049ac44245c803e960553db90b80fe11fed13a5b75bf8d58fee63654733e29fa980fb4db7c298c0047cbcae145d74e5d652fa97fe538854fb74133274ee5e885fa1e72b47892c68306b99c77c893500f3a33e85f2f74b01b0badca57ecc8df1868f8c7efefdf98999cf", 0xda}, {&(0x7f0000000740)="a559bd51a5f8c2658421dec8c56e76ef5873a7151ea5fe383e0ad929c407f53941622bc94f91dd5a9f7f131c2ec9f29f3bc853337f16fb8a7d53a13cd2ee9a137fff1b61796ab404dfb702a9e89e9996e94d24b4532df0bf55e3952d9a30c2cb343cc22af58ff2ff08835bca1fb11a41b47328928536bcd5216dcc9d6f02d5cb9622e173dcd0533f4d81170962", 0x8d}], 0x2, &(0x7f0000000800)=[{0x50, 0x116, 0x112, "675dde676b6e22752caf7aa66d8b5a22e2b86049be70773e38c300224caae43033ff8897162bd58f6ea6af8179bc0252959b3ecc4f72da2e44"}, {0xf0, 0x10f, 0x3, "89e7e4d9fcfc48fa58de855983942c567f09fc012272d69cbae4c32fff1c6da92e027dd3b960362c2ab0e7c3a5115f40af7a17ec42a018b3b81954ea70d4cfe334e8c0df28e7eec6b62ad812eafeaaefd312fb1a6a11f02af59f8b34ada0043f160d47610489223c2466b818c8e0251ac4d72a6990cd10ecd87acd72718e6677ed7820fe471f9ddd52c7065e3fc4b8b20ba80bb356c16fd45542100c558ffd937132da4f9fcec69d8c8ba419d339da59b04bf391a3fa1aa7a97f0f67b28ce24cfad5862a484d7cd60c01213e96bd59fba60ad9065643e31ac2365b05e10b"}, {0x80, 0x88, 0x9, "8d4013b4eacd9a6f41192d509506179cf0e48faa227ee1cc8234a18e4ef58dd6854caf0b426c91bbbe8acd0c40593a934d4e336e3e6864b31a6925c057f9f702c5ff1f2cf6129fc6eea57bba406b7a64b3e9d9c545378be8b13a47786a74969c8cc7eb8e4248f83371ca5f2f"}], 0x1c0}, 0xfdf62f17714c7289) r2 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x400000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001500)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000000680)=""/108) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\x05\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) io_setup(0x0, &(0x7f0000000180)) getpid() chdir(&(0x7f0000000080)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') 23:50:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000240)={0x15, "669855b3d925e5abc9f23d582dac7e44cb07916204ee28af7fc204fb88440f7e331c845acef834c77fcb15ac5df551e3e1420fb7316ea93a263b1040a71142efcbc446c823990077eb5b71f17842b0ca12f4bf35d4a23b32b14c20689a4f6f3935070457d8a42f66ba25251d0d33f0e83d5aab2164e64b1b883da159dda07cea"}) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x800000000000004) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r1, 0x0) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80800) bind$inet(r3, 0x0, 0x27) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000680)={{0x2, 0x4e24, @multicast1}, {0x1, @random="9f20ec5ca5b8"}, 0x43, {0x2, 0x4e22, @remote}, 'gre0\x00'}) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) r4 = accept4(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000480)=0x1e5, 0x320) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000640)=0x9, 0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000300)={r1}) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000340), &(0x7f00000003c0)=0x4) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = epoll_create(0x9fa3) recvfrom$llc(r5, 0x0, 0x0, 0x40012100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000100)={0x60000008}) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f00000004c0), &(0x7f0000000540)=0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) epoll_wait(r7, &(0x7f00000005c0)=[{}], 0xb1, 0xda) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x803, 0x3) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x40, 0x200003, 0x7ff}, 0x10) connect$llc(r2, &(0x7f0000000140)={0x1a, 0x300, 0x7, 0x9, 0xfffffffffffffffc, 0x3}, 0x10) socket$isdn(0x22, 0x3, 0x33) 23:50:17 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000011c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 23:50:18 executing program 3: stat(0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7065726d68617420c5c2e54f8564455d9c75cf4fde8d3078303030"], 0x1) 23:50:18 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$SIOCX25GCALLUSERDATA(r0, 0x89e4, &(0x7f0000000240)={0x15, "669855b3d925e5abc9f23d582dac7e44cb07916204ee28af7fc204fb88440f7e331c845acef834c77fcb15ac5df551e3e1420fb7316ea93a263b1040a71142efcbc446c823990077eb5b71f17842b0ca12f4bf35d4a23b32b14c20689a4f6f3935070457d8a42f66ba25251d0d33f0e83d5aab2164e64b1b883da159dda07cea"}) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x800000000000004) r2 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) listen(r1, 0x0) r3 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000400), 0x80800) bind$inet(r3, 0x0, 0x27) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000680)={{0x2, 0x4e24, @multicast1}, {0x1, @random="9f20ec5ca5b8"}, 0x43, {0x2, 0x4e22, @remote}, 'gre0\x00'}) bind$llc(r2, &(0x7f0000000200)={0x1a, 0x30d, 0x4, 0x6, 0x3373, 0x23f33}, 0x10) r4 = accept4(r1, 0x0, &(0x7f00000001c0), 0x80800) setsockopt$inet_int(r3, 0x0, 0x7, &(0x7f0000000480)=0x1e5, 0x320) setsockopt$inet_dccp_int(r4, 0x21, 0xf, &(0x7f0000000380), 0x4) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r4, 0x28, 0x0, &(0x7f0000000640)=0x9, 0x8) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000300)={r1}) getsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000340), &(0x7f00000003c0)=0x4) write(r6, &(0x7f00000001c0), 0xfffffef3) r7 = epoll_create(0x9fa3) recvfrom$llc(r5, 0x0, 0x0, 0x40012100, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000100)={0x60000008}) getsockopt$TIPC_CONN_TIMEOUT(r5, 0x10f, 0x82, &(0x7f00000004c0), &(0x7f0000000540)=0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e24, @local}, 0x10) epoll_wait(r7, &(0x7f00000005c0)=[{}], 0xb1, 0xda) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet6(0xa, 0x803, 0x3) connect$llc(r2, &(0x7f0000000000)={0x1a, 0x304, 0x40, 0x200003, 0x7ff}, 0x10) connect$llc(r2, &(0x7f0000000140)={0x1a, 0x300, 0x7, 0x9, 0xfffffffffffffffc, 0x3}, 0x10) socket$isdn(0x22, 0x3, 0x33) 23:50:18 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) 23:50:18 executing program 3: stat(0x0, 0x0) open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgroups(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) clone(0x820002102011ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7065726d68617420c5c2e54f8564455d9c75cf4fde8d3078303030"], 0x1)