0000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f00000000c0)={0x2, 0x9}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x12}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:46:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) 06:46:32 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:32 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:46:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1835.026863][T22913] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:32 executing program 2: syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xfffffffffffeffff, 0x0) [ 1835.067439][T22926] bond0: (slave bond_slave_1): Releasing backup interface 06:46:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1835.115901][T22927] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:46:32 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f00000000c0)={0x2, 0x9}) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:46:32 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@dev, @remote}, 0xc) [ 1835.373781][T22936] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:32 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1835.651334][T22950] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1841.279893][ T26] audit: type=1800 audit(1572763598.526:73): pid=22956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.0" name="memory.events" dev="sda1" ino=16962 res=0 06:46:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="0a0655db7b2803b4f0a12585675d26b0d5e383e5b3b60ced5c54dbb7295df0df8217ad62005127000000000000e60000", 0x30) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha384\x00'}, 0x58) 06:46:38 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 06:46:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, &(0x7f00000000c0)={0x2, 0x9}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:46:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:38 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1841.499104][T22964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:38 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1841.581979][T22972] bond0: (slave bond_slave_1): Releasing backup interface 06:46:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 1841.641950][T22974] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:46:38 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) [ 1841.825581][T22980] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:39 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1842.075163][T22995] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ptype\x00\xcc\xf8V\xfe~\xdc\x94\x8e\xf06Ff\x00\xab\xa5\xd6\xeaY\xc8\xb5F\xfa\xa1\xd2\xc4*,ZT') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 06:46:48 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 06:46:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$SHM_UNLOCK(0x0, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:46:48 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:48 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1850.909082][T23014] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1850.924962][T23021] bond0: (slave bond_slave_1): Releasing backup interface 06:46:48 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1850.975335][T23023] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:46:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:48 executing program 2: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='loginuid\x00') preadv(r0, &(0x7f00000017c0), 0x1b4, 0x0) 06:46:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x70, 0xb9, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 1851.235984][T23034] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:48 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:48 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1851.527731][T23045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000100)={0x0, &(0x7f0000000000), 0x0, r2}) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r2}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2, 0x4}) 06:46:54 executing program 2: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2000003, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet6(r0, &(0x7f0000d83fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xf, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x98) 06:46:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:46:54 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:54 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:46:54 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1857.276185][T23065] IPVS: ftp: loaded support on port[0] = 21 [ 1857.286839][T23066] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:54 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1857.377050][T23072] bond0: (slave bond_slave_1): Releasing backup interface 06:46:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) mmap(&(0x7f000005d000/0x400000)=nil, 0x400000, 0x0, 0x392d6ad36ec2c8b2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 1857.429106][T23073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1857.640967][T23080] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:46:54 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:46:55 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:46:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) [ 1857.912924][T23087] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1858.083866][T23071] IPVS: ftp: loaded support on port[0] = 21 06:47:03 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:47:03 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)="5500000020007fafb72d13b2a4a2809302000000030b43026c26236925000400fe7f0000bd2dca8a9848a3c728f1c46b7b31afdc1338d509000000000100005ae583de0d15000027c43ab8220000bf0cec6bab91d4", 0x55}], 0x1}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 06:47:03 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x6a, &(0x7f0000000340)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e897d3", 0x34, 0x2b, 0x0, @remote, @local, {[@dstopts={0x87}], @tipc=@payload_mcast={{{{{{0x2c, 0x0, 0x0, 0x0, 0x0, 0xb}}}}}}}}}}}, 0x0) 06:47:04 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1866.833707][T23125] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:04 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045503, &(0x7f0000000080)) [ 1866.939399][T23130] bond0: (slave bond_slave_1): Releasing backup interface [ 1867.018978][T23131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:47:04 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, &(0x7f0000000100)="b4", 0xffffffc5, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) [ 1867.408608][T23145] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:47:04 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1867.854250][T23159] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:11 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0xc00c5512, &(0x7f0000000080)) 06:47:11 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r1) 06:47:11 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:11 executing program 2: unshare(0x20600) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f0000000040)) 06:47:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1874.061101][T23174] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1874.115283][T23180] bond0: (slave bond_slave_1): Releasing backup interface 06:47:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) 06:47:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1874.177374][T23184] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:11 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0/bus\x00', 0x0, 0x0) 06:47:11 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) [ 1874.481844][T23190] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1874.818747][T23202] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:17 executing program 0: 06:47:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) 06:47:17 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:17 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) bind$inet6(r2, &(0x7f000012afe4)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000003, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) 06:47:17 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x264, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) [ 1880.374188][T23215] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:17 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1880.483509][T23224] bond0: (slave bond_slave_1): Releasing backup interface 06:47:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) [ 1880.590492][T23227] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) 06:47:18 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080), 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1880.725111][T23236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:21 executing program 0: 06:47:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:21 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:21 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) 06:47:21 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:21 executing program 2: 06:47:21 executing program 2: [ 1884.590020][T23256] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:21 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) sendmsg(r2, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1884.715823][T23265] bond0: (slave bond_slave_1): Releasing backup interface 06:47:22 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) close(r0) 06:47:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001300)=""/231, &(0x7f0000000140)=0x8) [ 1884.801891][T23266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:22 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1884.985057][T23273] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001300)=""/231, &(0x7f0000000140)=0x8) 06:47:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 06:47:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000080)) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001300)=""/231, &(0x7f0000000140)=0x8) 06:47:25 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:25 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1888.836742][T23294] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:26 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) [ 1888.925738][T23304] bond0: (slave bond_slave_1): Releasing backup interface 06:47:26 executing program 2: r0 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x2007fff) r1 = socket$inet6(0xa, 0x800000003, 0xff) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup(r1) r3 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8000fffffffe) creat(&(0x7f0000000140)='./bus\x00', 0x0) [ 1889.010855][T23305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1889.137811][T23309] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:26 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1889.242428][ T26] audit: type=1804 audit(1572763646.486:74): pid=23318 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir212184766/syzkaller.Ox9Qp5/1512/bus" dev="sda1" ino=16978 res=1 [ 1889.298654][ T26] audit: type=1804 audit(1572763646.536:75): pid=23319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir212184766/syzkaller.Ox9Qp5/1512/bus" dev="sda1" ino=16978 res=1 [ 1889.368899][ T26] audit: type=1804 audit(1572763646.556:76): pid=23319 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir212184766/syzkaller.Ox9Qp5/1512/bus" dev="sda1" ino=16978 res=1 [ 1889.411555][T23323] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:47:33 executing program 0: 06:47:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) 06:47:33 executing program 2: pipe(0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x800002, 0x11, r0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x1000f4) write(r2, &(0x7f00000001c0), 0xfffffef3) sync_file_range(0xffffffffffffffff, 0x0, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:47:33 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x0, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:33 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:33 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:33 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x0, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1896.536010][T23345] bond0: (slave bond_slave_1): Releasing backup interface 06:47:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) [ 1896.623372][T23347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x0, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:34 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:34 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) 06:47:37 executing program 0: 06:47:37 executing program 2: 06:47:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:37 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) 06:47:37 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:37 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:37 executing program 2: 06:47:37 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 06:47:37 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5}) 06:47:38 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1900.809786][T23380] bond0: (slave bond_slave_1): Releasing backup interface [ 1900.884392][T23383] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1900.943666][ T26] audit: type=1804 audit(1572763658.186:77): pid=23389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2328 res=1 06:47:38 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x17e, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 1901.018892][ T26] audit: type=1800 audit(1572763658.246:78): pid=23389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="/" dev="sda1" ino=2328 res=0 06:47:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:47:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000040)={@dev, @remote, r2}, 0xc) 06:47:44 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:44 executing program 1: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x10}) 06:47:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) 06:47:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:47:44 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1906.947261][ T26] audit: type=1804 audit(1572763664.186:79): pid=23413 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2328 res=1 06:47:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) 06:47:44 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1906.997905][ T26] audit: type=1804 audit(1572763664.226:80): pid=23417 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/" dev="sda1" ino=2328 res=1 [ 1907.128145][T23423] bond0: (slave bond_slave_1): Releasing backup interface 06:47:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/61, 0x3d}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036}, 0x3f00) socketpair(0x1, 0xd, 0x8, &(0x7f0000000380)) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r2, &(0x7f00000004c0)="1dda0d4d452a1a596c47c5e93a0b9971b145b795b38d27831c31d2765263849718955908f53f41077c3d8d95670163a987edd3b24a924f2aae73689f0627b18ca7302b8f14cac30ceb14be0046acb68e6d7fb5f076be1d22de7332d2da005632f3b9c4d6dec44cc1ad013f646f7c917c99d5061add43323f5c5b4894b916ac5e7bcdf28a005cdccbfc756bcfd7e613765aa51f7536e3587d4f94a71ee5f10e415df442870f21aec80a0d0a3a0423089fd1d1009e825f96703b62ad95235197d6bdcf8ea59e2f459164176a80147f9db415aa0b9ee0e629de5a4e7e9448cdf7f6ac446c051e5879"}, 0x20) 06:47:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1907.191532][T23428] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, 0x0, 0x0) 06:47:44 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 06:47:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x100032, 0x0) 06:47:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:47:51 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x0, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/61, 0x3d}, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x6129cde3}], 0x1, &(0x7f00000001c0)=""/17, 0x10036}, 0x3f00) socketpair(0x1, 0xd, 0x8, &(0x7f0000000380)) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) close(0xffffffffffffffff) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r2, &(0x7f00000004c0)="1dda0d4d452a1a596c47c5e93a0b9971b145b795b38d27831c31d2765263849718955908f53f41077c3d8d95670163a987edd3b24a924f2aae73689f0627b18ca7302b8f14cac30ceb14be0046acb68e6d7fb5f076be1d22de7332d2da005632f3b9c4d6dec44cc1ad013f646f7c917c99d5061add43323f5c5b4894b916ac5e7bcdf28a005cdccbfc756bcfd7e613765aa51f7536e3587d4f94a71ee5f10e415df442870f21aec80a0d0a3a0423089fd1d1009e825f96703b62ad95235197d6bdcf8ea59e2f459164176a80147f9db415aa0b9ee0e629de5a4e7e9448cdf7f6ac446c051e5879"}, 0x20) 06:47:51 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:51 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:51 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 06:47:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1914.424508][T23467] bond0: (slave bond_slave_1): Releasing backup interface [ 1914.519705][T23470] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:51 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 06:47:52 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:47:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x133, 0x0, 0x0, 0x10289) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x40, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_GET_NESTED_STATE(r4, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) [ 1920.507888][T23502] EXT4-fs (sda1): re-mounted. Opts: [ 1920.613295][T23507] EXT4-fs (sda1): re-mounted. Opts: 06:47:57 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x101d0}], 0x1, &(0x7f00000001c0)=""/17, 0x10036}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) 06:47:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380), 0x0) 06:47:57 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:57 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r0 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r2, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:47:57 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:47:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000020a0001006e6574656d0000f91b0002000000000000000000b12c00"/54], 0x4c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0xe03f0300, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1920.799937][T23516] netem: invalid attributes len -1 [ 1920.824806][T23516] netem: change failed 06:47:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380), 0x0) [ 1920.856535][T23516] netem: invalid attributes len -1 [ 1920.881216][T23516] netem: change failed 06:47:58 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x2000) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:47:58 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:47:58 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000002400070500"/20, @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000020a0001006e6574656d0000f91b0002000000000000000000b12c00"/54], 0x4c}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000140)=[{0xe03f0300, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 1920.949863][T23525] bond0: (slave bond_slave_1): Releasing backup interface [ 1921.035665][T23528] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:47:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380), 0x0) 06:47:58 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1921.180539][T23540] netem: invalid attributes len -1 [ 1921.192914][T23540] netem: change failed 06:48:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 06:48:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r2, r0, 0x0, 0x3d00) 06:48:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 06:48:05 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:05 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:05 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:05 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:05 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1928.011807][T23570] bond0: (slave bond_slave_1): Releasing backup interface [ 1928.102841][T23571] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 06:48:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 06:48:05 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:05 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 06:48:05 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xfffffffffffffced}, {&(0x7f0000000380)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03d53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24dd620b2022d5ad63b369aaffe900b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92944076d3b97247e066002314da52d04ea8c924cd48d6225ccf1032f51d36ab231f6c20d87e91eed2f2db4734535e0293b467edf69776dca67d90a15dcd18fb9cff00000078e382dcf296a23a060b81e1bc48d6854b8f54b55d8b33442037fb348b4067ffb88ba83804368b5b44df52ea0400000000000000ff9b90b861f6f9cb2b079d0d3ff4e469d024f863c055d9802eb5d0f9b6ee8292dce64f0b35a600aab58317f622a1e7c4b8ded6f5ad8ca6756fc31f1450c2ab081c34309c0a93fa4f300ff7872492153aea77478d20c94b9e4bc8c6", 0x141}], 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:48:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) 06:48:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)}], 0x1}, 0x0) 06:48:12 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:12 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:12 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:12 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)}], 0x1}, 0x0) 06:48:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000004e00)={&(0x7f0000ff2000/0xe000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff3000/0x4000)=nil, &(0x7f0000ff2000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x4000)=nil, 0x0, 0x0, r0}, 0x68) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='cmdline\x00') preadv(r1, &(0x7f00000017c0), 0x3a8, 0x0) [ 1935.380609][T23618] bond0: (slave bond_slave_1): Releasing backup interface 06:48:12 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1935.466381][T23620] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:12 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, 0x0, 0x0) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:12 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)}], 0x1}, 0x0) 06:48:21 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045519, &(0x7f0000000080)) 06:48:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x0) 06:48:21 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:21 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140), 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:21 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010002800", 0x26}], 0x1}, 0x0) 06:48:21 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:21 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140), 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r1 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendfile(r1, r0, 0x0, 0xb60) 06:48:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010002800", 0x26}], 0x1}, 0x0) [ 1944.726087][T23664] bond0: (slave bond_slave_1): Releasing backup interface 06:48:22 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1944.825488][T23665] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:22 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140), 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:22 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010002800", 0x26}], 0x1}, 0x0) 06:48:28 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000080)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x1) 06:48:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0xc0105512, &(0x7f0000000080)) 06:48:28 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:28 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000280000001100ffffba16a0aa1c0900000000000012", 0x39}], 0x1}, 0x0) 06:48:28 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:28 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:28 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8108551b, &(0x7f0000000080)) 06:48:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010002800", 0x26}], 0x1}, 0x0) [ 1951.083580][T23707] bond0: (slave bond_slave_1): Releasing backup interface [ 1951.185010][T23708] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:28 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8108551b, &(0x7f0000000080)) 06:48:28 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:34 executing program 0: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x4e041) 06:48:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010002800", 0x26}], 0x1}, 0x0) 06:48:34 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:34 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, 0x0, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:34 executing program 1: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffffffffffffe7b, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025081700d1bd", 0x2e}], 0x1}, 0x0) 06:48:34 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 1957.255820][T23738] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 06:48:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000", 0x13}], 0x1}, 0x0) [ 1957.339174][T23750] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 1957.418690][T23751] bond0: (slave bond_slave_1): Releasing backup interface 06:48:34 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:34 executing program 1: ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x660c, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0xfffffffffffffe7b, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e370900018025081700d1bd", 0x2e}], 0x1}, 0x0) [ 1957.522385][T23752] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000", 0x13}], 0x1}, 0x0) [ 1957.668927][T23761] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 06:48:35 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, 0x0, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:35 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:40 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x802c550a, &(0x7f0000000080)) 06:48:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000", 0x13}], 0x1}, 0x0) 06:48:40 executing program 1: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000b80)={'#! ', './file0'}, 0xb) pipe(0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000e00], 0x0, 0x0}, 0x78) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r3, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='veno\x00', 0x5) close(r3) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)) prctl$PR_SET_PTRACER(0x59616d61, r0) r4 = syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x52080) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000300)) r5 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000001980)) ptrace$getregs(0xe, r5, 0x9, &(0x7f00000001c0)=""/68) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 06:48:40 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:40 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:40 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, 0x0, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008", 0x1d}], 0x1}, 0x0) [ 1963.726390][T23791] bond0: (slave bond_slave_1): Releasing backup interface 06:48:41 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1963.824187][T23793] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:41 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) dup3(0xffffffffffffffff, r0, 0x0) 06:48:41 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008", 0x1d}], 0x1}, 0x0) [ 1964.119444][ T2494] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1964.130644][T23809] F2FS-fs (loop2): Unable to read 1th superblock [ 1964.156313][ T2494] blk_update_request: I/O error, dev loop2, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 06:48:41 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r4 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1964.167694][T23809] F2FS-fs (loop2): Unable to read 2th superblock [ 1964.175336][ T2494] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1964.190894][T23812] F2FS-fs (loop2): Unable to read 1th superblock [ 1964.198117][ T2494] blk_update_request: I/O error, dev loop2, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1964.209321][T23812] F2FS-fs (loop2): Unable to read 2th superblock 06:48:49 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8038550a, &(0x7f0000000080)) 06:48:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008", 0x1d}], 0x1}, 0x0) 06:48:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) dup3(0xffffffffffffffff, r0, 0x0) 06:48:49 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:49 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f00000724280800080008400400", 0x22}], 0x1}, 0x0) 06:48:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r6, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1972.063360][T23838] bond0: (slave bond_slave_1): Releasing backup interface 06:48:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) dup3(0xffffffffffffffff, r0, 0x0) [ 1972.161320][T23839] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:49 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f00000724280800080008400400", 0x22}], 0x1}, 0x0) 06:48:49 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000000c0)) dup3(0xffffffffffffffff, r0, 0x0) 06:48:49 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x2202) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1972.277680][ T2493] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1972.290226][T23849] F2FS-fs (loop2): Unable to read 1th superblock [ 1972.297314][ T2493] blk_update_request: I/O error, dev loop2, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1972.315293][T23849] F2FS-fs (loop2): Unable to read 2th superblock 06:48:57 executing program 0: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='msdos\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:48:57 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f00000724280800080008400400", 0x22}], 0x1}, 0x0) 06:48:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r3, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x240, 0x0, 0xffffffffffffff37) 06:48:57 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:48:57 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:48:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000", 0x24}], 0x1}, 0x0) [ 1980.359524][T23883] bond0: (slave bond_slave_1): Releasing backup interface 06:48:57 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$packet(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = epoll_create(0xfff) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)) dup2(r1, r2) epoll_wait(r3, &(0x7f0000000180)=[{}], 0x1, 0xfffffffffffffffe) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 1980.421742][T23885] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:48:57 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:57 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000", 0x24}], 0x1}, 0x0) 06:48:57 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:48:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000", 0x24}], 0x1}, 0x0) 06:49:03 executing program 0: unshare(0x40000000) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() socket$netlink(0x10, 0x3, 0x5) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000080)=""/4096) 06:49:03 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:03 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f00000724280800080008400400100028", 0x25}], 0x1}, 0x0) 06:49:03 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:03 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:49:03 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = socket(0x40000000015, 0x5, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) sendmsg$sock(r1, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r3, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1986.523219][ T2494] blk_update_request: I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1986.534314][T23916] FAT-fs (loop1): unable to read boot sector 06:49:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000", 0x24}], 0x1}, 0x0) 06:49:04 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:04 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x80, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x97}], 0x1}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x47, &(0x7f0000000000)}, 0x0) [ 1986.799471][T23936] bond0: (slave bond_slave_1): Releasing backup interface [ 1986.893485][T23937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f000007242808000800084004001000", 0x24}], 0x1}, 0x0) 06:49:04 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f00007a5000/0x4000)=nil, 0x4000, 0x0, 0x2010, r0, 0x0) 06:49:04 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1990.791971][T23968] IPVS: ftp: loaded support on port[0] = 21 06:49:08 executing program 0: unshare(0x40000000) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() socket$netlink(0x10, 0x3, 0x5) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x1e) wait4(0x0, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000080)=""/4096) 06:49:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010", 0x23}], 0x1}, 0x0) 06:49:08 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000080)) 06:49:08 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:08 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:08 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:49:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010", 0x23}], 0x1}, 0x0) 06:49:08 executing program 1: socket$kcm(0x10, 0x0, 0x10) r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000002c0)="2e000000130081c5e4050cecdb4cb90407255e431a00000000fffffff00200000600b0efb07ab30006000c0004ff", 0x2e}], 0x1}, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 06:49:08 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1991.089789][T23986] bond0: (slave bond_slave_1): Releasing backup interface [ 1991.179487][T23989] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1991.189173][T23991] bridge0: port 1(bridge_slave_0) entered blocking state [ 1991.196353][T23991] bridge0: port 1(bridge_slave_0) entered forwarding state 06:49:08 executing program 1: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) mount(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 06:49:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000003c0)="24000000180007351dfffd946f610500020000091f0000072428080008000840040010", 0x23}], 0x1}, 0x0) 06:49:08 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 1991.441508][ T2494] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1991.453809][T24004] F2FS-fs (loop2): Unable to read 1th superblock [ 1991.463489][ T2494] blk_update_request: I/O error, dev loop2, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1991.474507][T24004] F2FS-fs (loop2): Unable to read 2th superblock [ 1991.497711][ T2493] blk_update_request: I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1991.518247][T24006] F2FS-fs (loop2): Unable to read 1th superblock [ 1991.540920][ T2493] blk_update_request: I/O error, dev loop2, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1991.553644][T24006] F2FS-fs (loop2): Unable to read 2th superblock [ 1995.122315][T24018] IPVS: ftp: loaded support on port[0] = 21 06:49:14 executing program 0: 06:49:14 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000648000/0x2000)=nil, 0x2) 06:49:14 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045510, &(0x7f0000000080)) 06:49:14 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:14 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:49:14 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:14 executing program 1: 06:49:14 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:14 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1000001, 0x13, r1, 0x0) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045510, &(0x7f0000000080)) 06:49:14 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffd1e, 0x0) [ 1997.443594][T24037] bond0: (slave bond_slave_1): Releasing backup interface [ 1997.525404][T24038] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000648000/0x2000)=nil, 0x2) 06:49:14 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:18 executing program 0: 06:49:18 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x80045515, &(0x7f0000000080)) 06:49:18 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00', &(0x7f0000000200)='keyringbdev\\vmnet1{cgroupsystem[/&,md5sumvboxnet0,em0}userusercgroup-(*ppp1+%vmnet0}user,feth0@-\x00', 0x61, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 06:49:18 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffd1e, 0x0) 06:49:18 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:18 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:18 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, 0x0, 0x0, 0x0) 06:49:18 executing program 4: 06:49:18 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2001.663995][T24081] bond0: (slave bond_slave_1): Releasing backup interface [ 2001.762616][T24084] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:19 executing program 1: mknod(&(0x7f0000000100)='./file0\x00', 0x1040, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.impure\x00', &(0x7f0000000200)='keyringbdev\\vmnet1{cgroupsystem[/&,md5sumvboxnet0,em0}userusercgroup-(*ppp1+%vmnet0}user,feth0@-\x00', 0x61, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) unlink(&(0x7f0000000140)='./file0\x00') tkill(r0, 0x1000000000016) 06:49:19 executing program 4: 06:49:19 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, 0x0, 0x0, 0x0) 06:49:24 executing program 0: 06:49:24 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) keyctl$revoke(0x3, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:24 executing program 4: 06:49:24 executing program 3: r0 = socket$inet6(0xa, 0x100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r1 = socket$inet6(0xa, 0x1200000002, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x781, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000001c0)={@loopback}, 0x14) setsockopt$inet6_int(r1, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x1f0, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2202) sendmmsg(r0, 0x0, 0x0, 0x0) 06:49:24 executing program 1: 06:49:24 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xfffffffc}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:25 executing program 4: 06:49:25 executing program 1: 06:49:25 executing program 3: 06:49:25 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2007.938745][T24120] bond0: (slave bond_slave_1): Releasing backup interface [ 2008.024868][T24122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:25 executing program 1: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000240)={{0x2, 0x0, @empty}, {0x4000030000000304, @random="6c21355111a4"}, 0x4, {0x2, 0x0, @remote}, 'bpq0\x00'}) 06:49:25 executing program 3: add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000040)) 06:49:29 executing program 0: 06:49:29 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x20000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ppoll(&(0x7f0000000540)=[{r1}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 06:49:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:29 executing program 1: 06:49:29 executing program 3: 06:49:29 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:29 executing program 1: 06:49:29 executing program 3: 06:49:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2012.176816][T24160] bond0: (slave bond_slave_1): Releasing backup interface [ 2012.265372][T24164] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:29 executing program 3: 06:49:29 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000003240)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)=""/6, 0x6}, {&(0x7f0000000140)=""/176, 0xb0}, {&(0x7f0000003380)=""/67, 0x43}], 0x3, &(0x7f0000000380)=""/197, 0xc5}, 0x20}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) r5 = accept$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) getsockopt$inet_udp_int(r5, 0x11, 0x66, &(0x7f0000000300), &(0x7f0000000480)=0x4) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r6, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}}, 0x1c) r7 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r7, 0x0, 0x0) setsockopt$sock_int(r7, 0x1, 0x88e7b967e6a2d53a, &(0x7f00000001c0)=0x3, 0x4) fcntl$dupfd(r6, 0x406, r7) creat(0x0, 0x0) socket$inet6(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 06:49:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000440)={@initdev={0xfe, 0x88, [], 0xfe, 0x0}, @rand_addr="a3bdbe4cab2f7c976e22165ff6fa247f", @ipv4={[], [], @loopback}, 0x2, 0x20, 0x5, 0x400, 0xba}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:33 executing program 0: 06:49:33 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:33 executing program 1: 06:49:33 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:33 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:33 executing program 4: 06:49:33 executing program 4: 06:49:33 executing program 1: clone(0x3103101ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x500001b, 0x8031, 0xffffffffffffffff, 0x0) munmap(&(0x7f00008f1000/0x1000)=nil, 0x1000) openat(0xffffffffffffffff, 0x0, 0x200, 0x50) [ 2016.433704][T24205] bond0: (slave bond_slave_1): Releasing backup interface 06:49:33 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719dfb87c553a688f9da801891bb3e336624a0a51c1169ab50284810381fdf180daa75aadc0004ffc6e1d9c45bb262480ae58ab2dda9bc528582294f139f5e1ad42a87d93f67fa82141e1528264daf3c0843587546f54bfe715be7131dcc0744d62432f3998bbb64ddd61ad5935cda485"], 0x0, 0xc7}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:49:33 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:33 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) [ 2016.531617][T24206] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:33 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x20000000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000c85000)) ppoll(&(0x7f0000000540)=[{r2}], 0x1, 0x0, 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) [ 2016.667650][T24218] ptrace attach of "/root/syz-executor.4"[24217] was attempted by "/root/syz-executor.4"[24218] 06:49:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x25161d00, 0x65}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 06:49:37 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) r1 = open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r2}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r5, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:37 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}, 0xd6c}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000001340)="b8f86d63a705292e5934724f95a7ca7410c0778a6cc7eb43438d063f849693d3089cff2ed7642c7d25f3cd3d56804b28a6853116483f9e4a70312ce01a2f81dfe4f709aa69fb80a75ddcb8bbedad67f0eb8f9181a0f6daafa714183eb1d5a08aff37935b0aca07357cf08a429ed56989215440fe2f196c27c12d928fbe73e36451336a496153167b4020ab765cd38b9a6436f906e4005f2dea529d2134314c18117e71a1c535d651ac59be6e03049dc98f84df7a11dd3dccd5a6a803acd9138b03d283377aa222b47075cda3e36bcd4cc8495b0c40c71ae1f26d8152c2f01f57d4c27c42583f7fde9cb10b0f18fe88aabc1e41cbaca9e1ddab74909f06d9a0d6686a844015a3471245b21ec8e1de75072b1288d80bc926b7c7ab4831bf057461424b7a0aba970ea71c447eafb54c7991611af2278f747bbe899fa5024ee270fc9b60e64624321077734536a91491075b9275ec4af825f86c441d8b9bd05ccfde3f96f563ce46106f280ad5c72e887b7089b597b62dfc2904439488f8a0c53fea4fad40c7053bc1abdf3a1cf8caa8c30f5de7a15743c61a1d1b09b4adcb0f35513f8a8800e47c6494924d2fe66b0da45c8157f710ba77550d09f4e796df91b9df8dc394ad9e1d81acc00a1254b5cc2c91ab670a911fa5f837731fec653e82be591104fc7411991a1a4fa927b3513f6779d2f9b618d0f23a3ac8166dd4630ed3d2ebe7959fab33afb94f54d3ea04282b7f5289eb721dafd82c654b828860e280a64ceeaf8875a5493ec5949dae8886bb87cf25e0db188e9d7adad021c35eac7c0def79602e70ba980d9028de9bf2b3a44fa0c6f4a3f8dd280a6c439afff0b7ebbf5400d9944f215451a1b66d20439bd1e09eb720612bba8953fc2e4a5a5dc25b840d88e36f1a5a794ff811d1df78ebeee67081c38906a48531dd0b1a36284c88a80666920b53c36e77fad3c4a25b320021e0d10b28f6be2c0ca8aa8be1bc0c97a39315b201dac2add2fd9437856b491adb33cdc1c4c60a4542d95299d0c798307dc515b06be5362139581e964939ca1c228f0b0ae07570c7046dedca5be59e5879f7449a7c4ea743e794868571d901d86256ca62a77ce900855ff8587fc417b42e52d5c066153f6348a232ee65f32e2f48f0a8fbef5090873cac47e7609fa7dd90494c67381a986d3a2be6df3ac2e756382c31440dd85197438120c7e47492890db925060a4640ef6ebc8a0c7cdd66be17d2ddd8e55d76d81bfde9e82c26b7fc142b19c1dbf93a62a5987bddffa7d753bc9e00b072e4961803ef9d131fc1e8e78a4656c7e7bc171bf97713b42ec72fa81a1df3b08a314b30b295856f95fe2b113fb7d635da6f072d55167e72b969377d20582bcbdffe04c6f166868dd74bab336a887494c6ff87b6247cf54b64798ba78e64666cf432ff533d420dcc61596e1b5cad180cee5dd90459519cd4366989fad9d0ef5454f4a4b44ddb7b1c650292e06525ea7700c5fe95c08f714c0d4cf0a85f955c66e00c0d77d7688e972ce8b287414cec1c0c896aabd7e5d3fb389f0621b0890064372b54d3355098ba434995b94220c2d0ef40880be798550bcb0d9f12db96a59724ba1f6d54ba3e126c5f5d0d0b0682654e8aa7b49eb09a9870b2e23fcc390cf4da6a96b43c75ba3e3cac23e54236ff2e202d7ca3a82bcd3805d3663888513bfabfc4e421873d1213a5e5b3effd1bf78800ab859dd16902a6b230d00cb0f6d7386095f85a2a8361d8cf7bc4bc8aa93b9ae63a7854be02386505c33991a3eb4cfd9b6a85b89330962c73b00133aef4f671c0b8a1764e1007af2794598ffc2eb94103ac8ae5ad03dc7d9042002d8dee82f02f16a176b2e2120088ae1d6e1333e7af3d0b0b406f13294214a67d6d6e7446c84b162d47d0f5fed8d1f705d4174d57cc917d516e18c4b02fe0d7f77f19f4247db3de6e3b67bcd60a944421f80f0c82694dd8410d6adff1d4cfe2c1ce65b1560bac641e680f87a9a4069b8fa6fdb30172b5df11e461e698fa371890728918a0450e72d7d0df2355f40123035b11737a0c0772c4c025c9f2b2ad985c73f2ad57454100b453dd12498ef10ba4cbc2daf3dce67684a19abb512ecc6a2de437cab8b3319af79ef3a5606080a7ce815b8a59ad7f7c527b435c155827eeabc4d7fab233b9b3867f30a7e5c5f4a3591c51a2a581a30be8530bd3809cae53a69947d26393b00adadffc2b7595e6c8c02186b8ba62ef34dd92dd386fe94c33e187f788c8adaec5c130bd655e8ebca04d0bd2d4e13afa4b696a8addc160313f1261823059452a6b82aabfb598e6996ad1d150084879715793bc17e2d93b0d2724871dfa84832e4c6e019ddc2cff21bf8b2064c1183717badcf5d09e1fd58db823d0f2e9d00efc208ae8c935e1d19a3e3940fc897dd87063450d2178de983e96dc457cd344694d8f7eac587ad4bebf4daa380a97457cff606d090d1c24b6ee4e18afd1444042668e2b23513554c2e1afa9f91d44be921dc74f3414ade49d0da38c11b75ab97adafc20fba711951b2c8d26331512f472f89ed40ebc42ba8aaba7925637482aa52d28a9babd0e7932cd7e5f57901f0ac328a96504625d044511ab844bcac153a09c67889c94169e75ad86c5857343866318347e54605491d23fbdd3fcffc946a1f39cc2b87b918ce9f48acf0e903b715cf2b5512fae9b32292999985fc0d2f9779013ce469e29e361e92a9538ba04aac18e398dde15c71f41a59e2cf995aa8a644d4502aceace76f0cd928d3b1d49b6628b4d8ea3ad7964c2a892be5235210630b7df9fadc9f78372dd608fec52fe3d92428e9de88c494fa3a0801b0fea60a3f2e11dc87c91b6c02a527df51663d2b6f62278728c09e9308cdb71223211be89cd05f4982f5769a1e5c010ff9e843167c0ed9fbc46c49ac342b3890018e16d583672adf2b12006d1ab964f7355302b25111cb2c944750f3c469cfa62972148d23b5e204858aac3be84ede02cdfd5236fd21defe2ccf8aa6fc563584a9c7f257640179fb3aefc4519857598d9259ea44ae9addbefce8bfb2e3b3c9b2317e0f3cf2267cc944e5b243119f1e9ba1e187a35e8ab6da6ab7f0e133095cbb28cc082b2598750694a447455dbe1f3a9ffce77e585afb7b08c89ac2fa730dff40f6b778fe0cd0df74d584660fd2c79630e5a7e9a78884a9bb690a233909901e7ace7d6826bdeb1903ac5b84870622ca180d10297baadbd13991ab08c4de3754de8ff33e1b316ac613bc1ebbacaca14b21ebc8e96fa314a02baa73502e07c9d567b72c99bb5506b4c14c19958838f5ec20aaf27e95796e0b7ffce45bdbffaafff4499706e8c9f47d51b79cad11ef546f380dbe0dbef03ae545c058e60cb2779f1e33a8f9e4acf3eeb8add8dc59b53898b5faf74986fdeebad70f1b6d0c52d08ee116ec94a77125795acdc052efbb99bf2b336eab7f8cbccd1f7ab5f6943c4753485e06b1bd24f340a3ac21d83c0b65a5125cf46e6cb8d05a5ca9ed6469498b5efa8c81518d821716f2c1e1696243100ed844bddd481951f3da5e98b6f8997c5d823e153f62a8b56903ae074041dba2f3aa1b1929811a56b90a602e4faee0e8f26372b5b66e500af69fe6891a059e070b06b32b5956c00a44f0fb526ad635d8867e83fc3bf4dd9d0f8cbb12aa7e0400b8aa87aaf5bde44ed54d85e113cf904ab6dac6b5219cb755f5d48b58e6f0f3cefc563175067900411d4df05aa56ac8f1779053e65ade0e49cddabc6a77421db27177614a1508bea8b84b024a1cf782454a16dcd07aa0b1cd19dcd76c2626614a05d1f3c93da6629db9b0bbb184bcbf61c3213fc0826161813247bbb6ae45723f1550aa94f3e39c1320002e531e3e71801f7d14b4686fd6a40b3a10fb85cbb2c72db8d4d13ffc6b4103ffa274d52d2bf5517ce771bff3b4d2a6d98ca1aa4607352e3f09e163ca29831020f49f3a499e86dbcfa2363eb1f610fb6d41a57bfdce1b88ef4ae10e0159cb03bf3aa9738d138d47f1ce2c196637af8f2a8551624dadcc097c266da3b47987487886ee5ba41e127b8727ffc1b398fd5281991a6819f25a52c3fae030dc68889f978f842dc538589d7c497f8037d3c664d95cac07420c142363594d45fdf2be65684e0c887f0be32a2893fb057a0f7369f45497d245fd6e65f5194b75f41ebd4d06b1333815d1514e5f790aa1f79aefff715d68d364111ea9c0ef3d7f829c46c702a0a1c350bd015d48f9a479a0d77acbdde8faacc3670a460a645e3b665e818b1a458e07d89c31b834957988a111d4abd1b0056480c6eb1094eb82e13cb071f2118f8345e69d6a7d7c35cbae98bd6a26cc42dccb45af439938c41092f782406d955ab61eb5892d061570ac7e902870bdc5a0a40bb6ad12658cbf9b6422c82b89edb33c49fbb9fb5e478165c04c69d29af67fc720275711cc96904170dc1a5207b2afe8b94902e4cdd579a15e80e75f2876109999bbdc336f50a7a2d6404218c7603bc7823d2a9292a76f9542138b023b208af88a8c7fb48da1c399a8e9b8e4b0efe568576280b4492caa3ad82d5a1481c86fa8343bd4ddb77fc47f73a248b83dffcbf2c3ac6598af0db73a1b7dcc5a21836d17e3d1132e88be931ead38599fb5de17f5f22f08a12122eaef0efd33685e62767ba46922a213bc0dd31ffb4edb95679344c213f28a1c50556df452cde2c9bdc83dc8b815a2bb280139bf3aabed7a551f510b4cd5beb0aded2c80799b9d8a8e90d071d18cb6d5eae6a098e9d12c60604a75c137bc0e9f4d0e6f8f19056f05068f6d825120d82a5838f52ff9df89f38f85aa10ceae32d16edcdef376fd05bf59681be677649bd418b677b2b85bfb1e632f9416ad4914352d7cb1090dffc1334cb19e052009340ec9150349bbaad37ac20ed6aca8aefb4bb591954d41e70b6659fa4d8259cce378341ceb1740b5e9ac015c8d6d6c847249f0ff44b74778bd819a9bc344dfc0990c084afd381e3c31b26f9ff586ffc43d572ca99888bcabb3841a65fa4bff9d7e963a6e50d31daa707f0f95be8185ca71018cb6afcabaeb3e4ce2c076b8d3229c5afb9dd4f0909984f56a6f9b8e85b962fba4cc7aea86a577bb535fbc2472471bc9250c2892eefb16b7d00c98b91e1344fb6b547f51aabe8d0e1065af068812dc937acfff9c3f9b07809499c5441fbbae446023d78ded53f646466c50efb012476ba58f7fc685c76aab0a0f86d17f946aa144b53517db2909b0bf172b4ac3cfae90e4b8e0e3c13979aee6890b89cf1b577b902ee55fb39e35d9ea893efe03ca6b91dbf712715793eece0642b396953e8ab8f1e56b7bfe9fde5fbcaaf649499fe3c2e1a3c594f960301dcd522e006f6253406bad8d10b31067523d682a8206b451ef1ab6528241916ca36982cd6cccb3d69b4075467e2d223c48dea7c9ea665371f0c60c3a521363193e08e584131e7bd19a0235b952bceabb185272536ca1a442118eb369b334166b45d35951eb2d13784eb4040b15c65759792e4bb101ebc026f0f94e747a907653e4a16527c2f9123f2cf8e8c4425a2254b558c2527d59c266d64599d31239dade4b65a7779dc57ec2f558d20fe9522351e94bea71586e267a4597f54e1ef907897a0b24d862f6c25eebaf443809e9303e802e540b5cba9745bfb4955edf2f4d91b55f9499fdac36abda6eaaea896e6d43482622293afb2112937f69a823c7e9ae417f50b1a3825dc5014fa2acc394ca938ccf5b674e0993712c556ee748bb968b29511404c32101f00770b00", 0x1000, 0xfffffffffffffffd) keyctl$update(0x2, r4, &(0x7f0000002340)="7051729b03c1ab83b9c873416de4d956c15266ee8ad62e01ab381cac0f4a3c9dc2a53d3b777e9e50f6dc78eeead2aa848094330ef0b6ecb274c266ef7aa85bbcd9541889bb9b2ad04d728c036c6691edcdd36cc5cc1b3b799093f55dec336a5181e0ae5857d3acacdd954ebef17bf14e440d836ccbe1b92c08469b7b186319b21cbe9e4d147f8017164eee478db21f5e4938f6ba311e5aa0746f8dd7615a9dfba2b6085d355d9bb9ee07794e0b0c319e3982b1868ebb5d38c134c331593d821b0845a0ff3924169de617050c9185d47ad03a8df65c26758a481834", 0xdb) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000fffffffe) socket(0x10, 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) socket$inet(0x10, 0x3, 0x0) 06:49:37 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:37 executing program 1: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x0) read(r0, &(0x7f00000009c0)=""/213, 0xd5) 06:49:37 executing program 4: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000080)='comm\x00') openat$cachefiles(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/cachefiles\x00', 0xf14371832dbdea92, 0x0) fcntl$setlease(r1, 0x400, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r4, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6=@mcast2, 0xfffd, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2000000}, {}, 0xfffffffc, 0x1, 0x80000000000001, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}}, 0xe8) sendmmsg(r4, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 06:49:37 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2020.641069][T24253] bond0: (slave bond_slave_1): Releasing backup interface [ 2020.723529][T24256] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0xf003, 0x6c00000000000000}, 0x334, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="280000001c000729d50000000000000007008000", @ANYRES32, @ANYBLOB="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"], 0x42e}}, 0x0) r2 = socket(0x10, 0x8000000000000003, 0x0) sendmmsg(r2, &(0x7f0000000000), 0x40000000000024a, 0x0) 06:49:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) open(&(0x7f0000000600)='./file0\x00', 0x28000, 0x8f952c73d3bb4775) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:43 executing program 0: r0 = socket(0x2, 0x803, 0x1) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10) connect$inet(r0, &(0x7f0000390000)={0x2, 0x0, @multicast2}, 0x10) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) write$P9_RSTATFS(r1, &(0x7f0000000080)={0x27}, 0xd) sendfile(r0, r1, 0x0, 0x72439a6b) 06:49:43 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x50000, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001300)=""/231, &(0x7f0000000140)=0x8) 06:49:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:44 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r4}, {r3}, {}], 0x3, &(0x7f0000000300), 0x0, 0x0) 06:49:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net/dev\x00') bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x7) [ 2026.924986][T24304] bond0: (slave bond_slave_1): Releasing backup interface [ 2027.022121][T24305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x9) write(r0, &(0x7f0000000040)="2f00000014000f3f00000000120f0a00", 0x10) 06:49:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:51 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r4}, {r3}, {}], 0x3, &(0x7f0000000300), 0x0, 0x0) 06:49:51 executing program 1: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:51 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r4}, {r3}, {}], 0x3, &(0x7f0000000300), 0x0, 0x0) 06:49:51 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:49:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:51 executing program 3: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, 0x0) 06:49:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2034.296085][T24365] bond0: (slave bond_slave_1): Releasing backup interface [ 2034.400683][T24368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:51 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendto(r0, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x5f) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1034}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x4d}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x1de}], 0x36c, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x0, &(0x7f0000003700)={0x77359400}) 06:49:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:51 executing program 1: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:52 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:52 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2035.283796][T24406] bond0: (slave bond_slave_1): Releasing backup interface [ 2035.361762][T24407] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:58 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r4}, {r3}, {}], 0x3, &(0x7f0000000300), 0x0, 0x0) 06:49:58 executing program 4: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:58 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:49:58 executing program 1: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/49, 0x20c000, 0x800}, 0x18) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x10000000002) 06:49:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r4, r0, 0x0, 0xb60) 06:49:58 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2041.534061][T24431] bond0: (slave bond_slave_1): Releasing backup interface 06:49:58 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r4, r0, 0x0, 0xb60) 06:49:58 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2041.603535][T24434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:49:59 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 06:49:59 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r4, r0, 0x0, 0xb60) 06:49:59 executing program 4: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x1) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x3d1) 06:49:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:05 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r4}, {r3}, {}], 0x3, &(0x7f0000000300), 0x0, 0x0) 06:50:05 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:05 executing program 4: mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000648000/0x2000)=nil, 0x3) 06:50:05 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:05 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$unix(0x1, 0x2, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r4, r0, 0x0, 0xb60) 06:50:05 executing program 1: write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000c76166845fb30cf0b3c2b337225aac2e0e8de339f16258c643e8d9f06cffca5fce0b275efd57ba157ca11e1ed4d674491c7e82996e4ba5ce15529551af9f1295f9b02f705d4253670c0e670eb05a01f9fa9c3e3d7e82bdeba1a09fad9c500d953060a505662f82259f8e98c132809a1140b5f8bf50ee419c364f755c086bd7a036e23382e17b40ec3c44ec1e3a1e4559fcabec954e97092bfc26ded33b96a4ba1fb6c0a2ffbf75607a31975a4d2d1423328d8155af55e31806b2a56fe9ad0854bda8cb7491421418b33c76825db31ac375974671e3e42da46ac66fb927f8f53b58d70e6ec2409e603d0939aabbb3b7d718dcfb97e0fa21e52c117ce5c90f3f0db1b7e72966a4255ea62b02000000000000004709885edc631a7f911def1d2d0a8db6a6bbb5ea6daef546cc6bf1aa88615a2703113f34142333c40a5c3fd28419c76b78dba08467dcd84917e2e1b0c1cafb12"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r2, r0, 0x0, 0x10, 0x0}, 0x30) 06:50:06 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:06 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="0d00000000003639408fa3a3ba27660199783b0a82f79b32a7c8225086600a38e07d4db88a66596759e95307b680ab73e03c53555c97e8e37d01da4d44a994354a9fa3f355214eeabd24dd620b2022d5ad63b369aaffe9a6b608a5fece0eca95d71f2d3e60613a027fb50cbcbd92944076d3b97247e066005ccf1032f51d36ab231f6c20d87e91eed2f2db4734535e0293b467edf69776dca67d90a17ccd18fb9cff00000078e382dcf296a23a060b81e1bc48d6854b8f54b55d8b", 0xbb}], 0x4, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe6a, 0x0, 0x0, 0x0, 0xfffffffffffffee5}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 06:50:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = socket$unix(0x1, 0x2, 0x0) connect$unix(r3, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2048.829781][T24478] bond0: (slave bond_slave_1): Releasing backup interface [ 2048.944809][T24480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:50:06 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:06 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dRA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x88\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G\x8d;\xfa+\xa2%(}`\xc5L\xbb\xeb~}%\xddr\xbb\xe7\xf4|\xa7b\xeb\xd3\nW\x16\x10:\x0e%\x83\x01KfPXIu\xe5\x7f\x88q%\xaeLcx\x9b\xbc~,\xd1\x94g\xe3\xd8\xfefh\x82\xa0\xe5@', 0x2761, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000080)=0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd'}]}, 0xfdef) 06:50:06 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) socket$unix(0x1, 0x2, 0x0) [ 2049.300697][T24500] device nr0 entered promiscuous mode [ 2049.510704][T24500] device nr0 entered promiscuous mode 06:50:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x40801001) 06:50:13 executing program 1: socket$kcm(0x11, 0xa, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="10"], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x0) sendfile(r2, r2, &(0x7f0000000140)=0x3c00, 0x8800000) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80080080044df9, &(0x7f0000000040)) syz_open_dev$dspn(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000204}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24040000}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x0, 0x0) 06:50:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:13 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, 0x0) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:13 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x60, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r4) chown(0x0, 0x0, 0x0) r5 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)=[0x1ff]) sendmsg$inet(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 06:50:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2056.172433][T24530] bond0: (slave bond_slave_1): Releasing backup interface [ 2056.219867][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2056.225775][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:50:13 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2056.278631][T24533] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2056.459595][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2056.465415][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:50:13 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:13 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:14 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x60, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r4) chown(0x0, 0x0, 0x0) r5 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)=[0x1ff]) sendmsg$inet(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 06:50:14 executing program 1: socket$kcm(0x11, 0xa, 0x300) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="10"], 0x1) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r1, r2, 0x0, 0x7fffffff) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x0) sendfile(r2, r2, &(0x7f0000000140)=0x3c00, 0x8800000) sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, 0x0}, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x80080080044df9, &(0x7f0000000040)) syz_open_dev$dspn(0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000204}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x24040000}, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) socket$inet(0x2, 0x0, 0x0) [ 2057.019596][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2057.025409][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:50:22 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x60, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r4) chown(0x0, 0x0, 0x0) r5 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)=[0x1ff]) sendmsg$inet(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 06:50:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:22 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x0, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:22 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:22 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x60, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r4) chown(0x0, 0x0, 0x0) r5 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)=[0x1ff]) sendmsg$inet(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 06:50:22 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb857) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x60, 0x0, 0x0) write$sndseq(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r4) chown(0x0, 0x0, 0x0) r5 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r5, 0x0, 0x11, &(0x7f0000000000)=[0x1ff]) sendmsg$inet(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 06:50:22 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:22 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2065.569146][T24592] bond0: (slave bond_slave_1): Releasing backup interface [ 2065.644979][T24593] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:50:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:23 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:23 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:23 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:29 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x0, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2, 0x0) dup2(r2, r3) 06:50:29 executing program 0: 06:50:29 executing program 1: 06:50:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x0, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:29 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x0, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:29 executing program 4: 06:50:29 executing program 1: 06:50:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2072.010238][T24636] bond0: (slave bond_slave_1): Releasing backup interface [ 2072.113877][T24637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:50:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:29 executing program 4: 06:50:29 executing program 1: 06:50:29 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000180)="13", 0x1}], 0x1, 0x8180a) sendfile(r0, r1, 0x0, 0x20000102000007) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 06:50:35 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x0, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:35 executing program 4: 06:50:35 executing program 1: 06:50:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:35 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x0, 0x0, 0x600f, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:35 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendfile(r1, r0, 0x0, 0xb60) 06:50:35 executing program 4: r0 = socket$inet6(0xa, 0x201000000000002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x45, 0x0, @ipv4={[], [], @empty}}, 0x1c) [ 2078.277552][T24677] bond0: (slave bond_slave_1): Releasing backup interface [ 2078.366305][T24679] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:50:35 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:35 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsopen(&(0x7f0000000000)='binfmt_misc\x00', 0x0) 06:50:35 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:41 executing program 0: 06:50:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendfile(r1, r0, 0x0, 0xb60) 06:50:41 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:41 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x0, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:41 executing program 4: 06:50:41 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x0, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:42 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='net/udp6\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f00000005c0)={0x0}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000700)={r1, 0x1, &(0x7f0000000600)=[0x9], &(0x7f0000000640)=[0xe199], 0x20, 0x2, 0x1, &(0x7f0000000680)=[0xc6, 0x7], &(0x7f00000006c0)=[0x4, 0xffffe8f3, 0x2, 0x3]}) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13\x00'/258, 0x275a, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000438000/0x3000)=nil, 0x3000, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000200)=[{&(0x7f0000000140)=""/12, 0xc}, {&(0x7f0000000180)=""/58, 0x7fffeff4}], 0x2, 0x0) 06:50:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendfile(r1, r0, 0x0, 0xb60) 06:50:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2084.832668][T24727] bond0: (slave bond_slave_1): Releasing backup interface 06:50:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2084.919410][T24729] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:50:42 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendfile(r1, r0, 0x0, 0xb60) 06:50:48 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e", @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38a3729f9fbaa545c0c343d9b3bec2feff1f63caf2a574ca"], 0x0, 0xa1}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:50:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:48 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) mount(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 06:50:48 executing program 1: syz_mount_image$vfat(&(0x7f0000000080)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xfffffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000300)={0x3, 0x0, [{0x0, 0x0, 0x8000, 0x1f, 0x800}, {0x0, 0xffff0000, 0xfffff001, 0x3f, 0x3}, {0x2, 0xfffffc20, 0x140000, 0x80000001, 0x5}]}) fchdir(r0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x17e, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0xae) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f00000001c0), 0x8080fffffffe) creat(&(0x7f0000000280)='./file0\x00', 0x0) 06:50:48 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x0, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2091.104010][ T2493] blk_update_request: I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2091.115666][T24776] F2FS-fs (loop8): Unable to read 1th superblock 06:50:48 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2091.173077][T24780] bond0: (slave bond_slave_1): Releasing backup interface 06:50:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2091.216109][ T2493] blk_update_request: I/O error, dev loop8, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2091.237856][T24776] F2FS-fs (loop8): Unable to read 2th superblock [ 2091.295085][T24784] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2091.320461][ T2494] blk_update_request: I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2091.331970][T24763] F2FS-fs (loop8): Unable to read 1th superblock [ 2091.348393][ T2494] blk_update_request: I/O error, dev loop8, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2091.360807][T24763] F2FS-fs (loop8): Unable to read 2th superblock 06:50:48 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) mount(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 06:50:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:48 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2091.776646][ T2494] blk_update_request: I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2091.794729][T24799] F2FS-fs (loop8): Unable to read 1th superblock [ 2091.804444][ T2494] blk_update_request: I/O error, dev loop8, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2091.819591][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2091.825383][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2091.840706][T24799] F2FS-fs (loop8): Unable to read 2th superblock 06:50:49 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) mount(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) [ 2092.379635][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2092.385480][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2092.939689][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2092.945517][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2093.179606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2093.185361][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2093.339658][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2093.345420][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2097.099630][ C0] net_ratelimit: 18 callbacks suppressed [ 2097.099645][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.111089][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:50:54 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x38f4168b7592eaea, 0xed13f8ac3df0acdb, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000480), 0xfffffffffffffdce, 0x5d8, 0x0, 0x150) 06:50:54 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x0, 0x0, 0x2, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:50:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:54 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:54 executing program 1: pipe(&(0x7f0000000200)) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000000)={&(0x7f0000ffb000/0x5000)=nil, 0x1000000, 0x2, 0xbad3fc0971f6927f, &(0x7f0000ffc000/0x4000)=nil}) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 06:50:54 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6242, 0x0) clone(0x8000000101, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB='./file0'], &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='f2fs\x00c\x9b\xec\xe8Dv\xff\xd2\xd6\xc9LR\x12Df6\x1dA\xbc@\x1c\xf7\r\xfb4\xe2\n\x91\x91\xeb\x8d]\xbcy\xf7\xe0o\x1a%\x9e\xd6%\xdf\x85\x11-$\x8c9\x84\x0f\xe45=\x85\xa1\xa3\xa5\x87\xfa\xb5\xa5\x18\xda\xe0\xc53\xb1\\^\x12.\x03\x1a\xef\x00\x8f\x8d\xa8,\xe8\xc6\x8a\xdd\xee\x05#\x1d\rI^,\xe6\x80\x8aY\xa0\x8cB\x1d\xfa\xe3*\nWk\xcd\xd5y\xb4u\x7f\xc4\x8eP\x1dT\xbf\n\x1b\xe1\x01\xaa\xf3\xebu\xb8\xa8(\xb6\xf2\x1a\x86\x17\n\x8d\x82\x1a{q\xb1X&\xae\xf6\x15M\xff\x86&\xd2n~\xdd\xcft{xD.L1\x8c\xf19E\xdf\xe5\x80\xbb)\xfd)l\xb6\xfa\x1eP\x90:\xe4\xb3-B\xe4,\xed}\x10\x1b\xb7^\xcc\xeb\x91\xd4\x05B6\xcaC\xad!\x9aG\x8b\x04Z\x1es\xa1\x85\x0e\xed\xc3\x99', 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) mount(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f00000000c0)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) [ 2097.340177][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.345989][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2097.364732][ T2493] blk_update_request: I/O error, dev loop8, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2097.376023][T24823] F2FS-fs (loop8): Unable to read 1th superblock 06:50:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:54 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000740)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x16) [ 2097.408444][ T2494] blk_update_request: I/O error, dev loop8, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2097.425738][T24823] F2FS-fs (loop8): Unable to read 2th superblock 06:50:54 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:50:54 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000002700)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002740)=""/4089, 0xff9}}], 0x40000000000015e, 0x12001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) syz_open_procfs(0x0, &(0x7f0000000180)='\x00\x00\x00\x00\b\x00\x00L^\xebty3\x06\xfd\xa6\xcf\x19\xfa\x00\x00') getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) pipe(0x0) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) pipe(0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000000000006, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYPTR64, @ANYRESOCT], 0x33) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f0000000340)) [ 2097.509600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.515448][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2097.558718][T24833] bond0: (slave bond_slave_1): Releasing backup interface [ 2097.632227][T24837] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:50:55 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:50:55 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2097.819608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2097.825423][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2098.059591][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2098.065412][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2102.229629][ C1] net_ratelimit: 22 callbacks suppressed [ 2102.229639][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2102.241030][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2102.779617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2102.785437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2103.339632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2103.345424][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2103.579599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2103.585403][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2103.739622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2103.745438][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x4400, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) 06:51:01 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719", @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544"], 0x0, 0x72}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:51:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r1 = socket$unix(0x1, 0x2, 0x0) sendfile(r1, r0, 0x0, 0xb60) 06:51:01 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:01 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x0, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:01 executing program 4: socket$inet(0x2, 0x1, 0x0) pipe(&(0x7f0000000140)) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) 06:51:01 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2103.944359][T24887] ptrace attach of "/root/syz-executor.4"[24886] was attempted by "/root/syz-executor.4"[24887] 06:51:01 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:51:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2104.098504][T24890] bond0: (slave bond_slave_1): Releasing backup interface [ 2104.194420][T24894] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2104.288611][T24906] usb usb7: usbfs: process 24906 (syz-executor.1) did not claim interface 0 before use [ 2104.308939][T24906] vhci_hcd: default hub control req: 0100 v0000 i0000 l0 06:51:01 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:01 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2104.493300][T24913] usb usb7: usbfs: process 24913 (syz-executor.1) did not claim interface 0 before use [ 2104.519381][T24913] vhci_hcd: default hub control req: 0100 v0000 i0000 l0 [ 2107.499619][ C0] net_ratelimit: 18 callbacks suppressed [ 2107.499628][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.511046][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2107.739578][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.745336][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2107.899606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2107.905406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2108.219603][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2108.225367][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2108.459613][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2108.465425][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:51:08 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000000)=@known='trusted.overlay.metacopy\x00') 06:51:08 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000780)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:08 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:51:08 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x0, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x907, 0x1) ioctl$USBDEVFS_SETINTERFACE(r0, 0x5522, 0x0) [ 2111.296490][T24929] usb usb7: usbfs: process 24929 (syz-executor.1) did not claim interface 0 before use [ 2111.340595][T24929] vhci_hcd: default hub control req: 0100 v0000 i0000 l0 06:51:08 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) [ 2111.395914][T24938] bond0: (slave bond_slave_1): Releasing backup interface 06:51:08 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2111.481609][T24939] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@show_sys_files_yes='show_sys_files=yes'}, {@utf8='utf8'}, {@dmask={'dmask', 0x3d, 0x7}}, {@umask={'umask'}}, {@disable_sparse_no='disable_sparse=no'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '}security{[@'}}, {@subj_role={'subj_role', 0x3d, '-wlan0wlan1'}}]}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000648000/0x2000)=nil, 0x0) 06:51:08 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000780)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:09 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2111.765032][T24953] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 06:51:09 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) [ 2111.874965][T24953] ntfs: (device loop1): parse_options(): Unrecognized mount option smackfsfloor. [ 2111.889823][T24953] ntfs: (device loop1): parse_options(): Unrecognized mount option subj_role. [ 2111.954361][T24953] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 2112.026141][T24953] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 2112.105157][T24953] ntfs: (device loop1): parse_options(): Unrecognized mount option smackfsfloor. [ 2112.124120][T24953] ntfs: (device loop1): parse_options(): Unrecognized mount option subj_role. [ 2112.137200][T24953] ntfs: (device loop1): parse_options(): Unrecognized mount option . [ 2112.619683][ C1] net_ratelimit: 22 callbacks suppressed [ 2112.625367][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2112.631119][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.179685][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.185465][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.739614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.745379][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2113.979594][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2113.985342][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2114.139642][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2114.145433][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:14 executing program 0: 06:51:14 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000780)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:14 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:14 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:14 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x0, {0x6, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:14 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x8, 0x0, &(0x7f0000000040)) 06:51:14 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:15 executing program 1: 06:51:15 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2117.825806][T24991] bond0: (slave bond_slave_1): Releasing backup interface 06:51:15 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2117.900504][ C0] net_ratelimit: 18 callbacks suppressed [ 2117.900567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2117.912295][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2117.925812][T24994] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:15 executing program 4: r0 = socket(0x1e, 0x4, 0x0) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:15 executing program 1: [ 2118.139615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2118.145470][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2118.299603][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2118.305427][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2118.619645][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2118.625408][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2118.859602][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2118.865368][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2123.019626][ C1] net_ratelimit: 22 callbacks suppressed [ 2123.025325][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2123.031155][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2123.579649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2123.585464][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:51:21 executing program 0: 06:51:21 executing program 4: r0 = socket(0x1e, 0x4, 0x0) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:21 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:21 executing program 1: 06:51:21 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:21 executing program 1: unshare(0x28000000) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:51:21 executing program 4: r0 = socket(0x1e, 0x4, 0x0) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:21 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:21 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2124.093357][T25033] bond0: (slave bond_slave_1): Releasing backup interface [ 2124.139620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.145432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2124.201027][T25037] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:21 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) [ 2124.379598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.385416][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:21 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2124.549593][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2124.555462][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:25 executing program 0: 06:51:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x0, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:25 executing program 1: 06:51:25 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:25 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:25 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:25 executing program 1: 06:51:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:25 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:25 executing program 4: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) [ 2128.299619][ C0] net_ratelimit: 18 callbacks suppressed [ 2128.299634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2128.311153][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2128.317077][T25079] bond0: (slave bond_slave_1): Releasing backup interface [ 2128.430517][T25082] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2128.539610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2128.545416][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:25 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:25 executing program 1: [ 2128.699651][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2128.705480][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2129.019604][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.025402][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2129.259662][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2129.265452][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:51:29 executing program 0: 06:51:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:29 executing program 4: r0 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:29 executing program 1: 06:51:29 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:29 executing program 1: 06:51:29 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$unix(0x1, 0x2, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e"}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2132.502437][T25121] bond0: (slave bond_slave_1): Releasing backup interface [ 2132.593795][T25122] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:29 executing program 4: r0 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:29 executing program 1: 06:51:30 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, 0x0, 0x0) [ 2133.419610][ C1] net_ratelimit: 22 callbacks suppressed [ 2133.419619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.431047][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2133.979640][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2133.985454][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.539603][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.545379][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.779633][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.785401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2134.939621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2134.945466][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:33 executing program 0: 06:51:33 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:33 executing program 1: 06:51:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, 0x0, 0x0) 06:51:33 executing program 4: r0 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:33 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, 0x0, 0x0) 06:51:33 executing program 4: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:34 executing program 1: [ 2136.796182][T25166] bond0: (slave bond_slave_1): Releasing backup interface [ 2136.896773][T25168] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:34 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:34 executing program 4: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 2138.699668][ C0] net_ratelimit: 18 callbacks suppressed [ 2138.705343][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2138.711120][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2138.939629][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2138.945428][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2139.099615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.105415][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2139.419616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.425437][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2139.659608][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2139.665397][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:51:38 executing program 0: pipe(&(0x7f0000000200)) sched_setattr(0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0}) setresuid(0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='map_files\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ppoll(&(0x7f0000000240)=[{r0}, {}, {}], 0x3, &(0x7f0000000300)={r1}, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKFLSBUF(0xffffffffffffffff, 0x1261, &(0x7f00000000c0)) 06:51:38 executing program 1: 06:51:38 executing program 4: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:38 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {}, 0x1}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:38 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:38 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r1, &(0x7f0000000140)="1f0000000104fffffd3b54c007110000f30501000b000200000000000000cf", 0x2e4) 06:51:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 06:51:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2141.060354][T25211] bond0: (slave bond_slave_1): Releasing backup interface [ 2141.165236][T25213] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2141.272080][T25226] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. 06:51:38 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2141.368491][T25228] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2143.819620][ C1] net_ratelimit: 22 callbacks suppressed [ 2143.825290][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2143.831025][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2144.379654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2144.385462][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2144.939625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2144.945391][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2145.179625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2145.185414][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2145.339627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2145.345426][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:44 executing program 0: 06:51:44 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) timer_create(0x7, &(0x7f0000000340)={0x0, 0x18, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000540)="ebe48aacd49374e3bef064ced0961183dc758a3934b556e098bd40d1e650c2b96d037c"}}, &(0x7f00000005c0)=0x0) timer_gettime(r1, &(0x7f0000000600)) timer_delete(r1) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r6, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 06:51:44 executing program 1: r0 = socket$kcm(0xa, 0x6, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890b, &(0x7f0000000000)) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040)=r1, 0x52d) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x890c, &(0x7f0000000100)) 06:51:44 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:44 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:44 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, 0x0, 0x0) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:44 executing program 1: [ 2147.376301][T25261] bond0: (slave bond_slave_1): Releasing backup interface 06:51:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2147.454864][T25262] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:44 executing program 1: gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdca, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001e000503ed0080648c6394f20531d20009000f4009000001a00000031800009700d0bdff0f0000000000", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002440)={0x19, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) 06:51:44 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, 0x0, 0x0) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:45 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2147.770804][T25276] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2147.831553][T25276] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2149.099648][ C0] net_ratelimit: 18 callbacks suppressed [ 2149.099658][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2149.111103][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2149.339660][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2149.345451][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2149.499605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2149.505361][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2149.819627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2149.825517][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2150.059636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2150.065441][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:51:48 executing program 0: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r2, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 06:51:48 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) timer_create(0x7, &(0x7f0000000340)={0x0, 0x18, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000540)="ebe48aacd49374e3bef064ced0961183dc758a3934b556e098bd40d1e650c2b96d037c"}}, &(0x7f00000005c0)=0x0) timer_gettime(r1, &(0x7f0000000600)) timer_delete(r1) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r6, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 06:51:48 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, 0x0, 0x0) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:48 executing program 1: gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdca, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001e000503ed0080648c6394f20531d20009000f4009000001a00000031800009700d0bdff0f0000000000", 0x2e}], 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000002440)={0x19, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x8, [], 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x3c) close(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) 06:51:48 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2151.490292][T25299] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.1'. 06:51:48 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x73, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) 06:51:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2151.629827][T25307] bond0: (slave bond_slave_1): Releasing backup interface [ 2151.722195][T25311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 06:51:49 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xfffffee5) socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080), 0x10) bind$tipc(r3, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x40, 0x0) read(r2, &(0x7f0000000000)=""/81, 0xffffffd5) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040031, r1, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x4000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:51:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2152.325609][ T26] audit: type=1804 audit(1572763909.566:81): pid=25334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir051964783/syzkaller.2pG8fl/1612/memory.events" dev="sda1" ino=17195 res=1 [ 2152.386692][ T26] audit: type=1800 audit(1572763909.566:82): pid=25334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=17195 res=0 [ 2152.600826][ T26] audit: type=1800 audit(1572763909.846:83): pid=25334 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="memory.events" dev="sda1" ino=17195 res=0 [ 2154.219629][ C1] net_ratelimit: 22 callbacks suppressed [ 2154.225316][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2154.231121][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2154.779654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2154.785455][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2155.339632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2155.345379][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2155.579645][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2155.585458][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2155.740040][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2155.745869][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:51:55 executing program 0: r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@mcast1, 0x0, 0x2b}, 0x2, @in, 0x0, 0x4}}, 0xe8) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x1aa, 0x0}}], 0x400000000000107, 0x0) 06:51:55 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x0, 0xffffffff, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:55 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:51:55 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) timer_create(0x7, &(0x7f0000000340)={0x0, 0x18, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000540)="ebe48aacd49374e3bef064ced0961183dc758a3934b556e098bd40d1e650c2b96d037c"}}, &(0x7f00000005c0)=0x0) timer_gettime(r1, &(0x7f0000000600)) timer_delete(r1) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r6, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 06:51:55 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:51:55 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xfffffee5) socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080), 0x10) bind$tipc(r3, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x40, 0x0) read(r2, &(0x7f0000000000)=""/81, 0xffffffd5) getpeername$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @local}, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400000000040031, r1, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x4000) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:51:56 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:56 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2158.927446][T25361] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:51:56 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:56 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0xe4ffffff, 0x65}, [@ldst={0x7, 0x3, 0x0, 0xa0c91}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) 06:51:56 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:51:56 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2159.499604][ C0] net_ratelimit: 18 callbacks suppressed [ 2159.499621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2159.511126][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2159.739589][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2159.745380][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2159.899607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2159.905359][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2160.219620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.225376][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2160.459603][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2160.465410][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2164.619603][ C1] net_ratelimit: 22 callbacks suppressed [ 2164.625301][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2164.631055][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:52:02 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000500)='sysfs\x00', 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:etc_aliases_t:s0\x00', 0x23, 0x0) 06:52:02 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0xc00c5512, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:52:02 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:52:02 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:52:02 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:02 executing program 3: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) timer_create(0x7, &(0x7f0000000340)={0x0, 0x18, 0x0, @thr={&(0x7f00000003c0), &(0x7f0000000540)="ebe48aacd49374e3bef064ced0961183dc758a3934b556e098bd40d1e650c2b96d037c"}}, &(0x7f00000005c0)=0x0) timer_gettime(r1, &(0x7f0000000600)) timer_delete(r1) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r2, 0x2081fc) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f00000001c0), 0xfffffef3) r5 = syz_open_procfs(0x0, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r5, 0x80046402, 0x0) r6 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x11, r6, 0x0) read(r3, &(0x7f0000000000)=""/250, 0x128b9372) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200)='threaded\x00', 0xf642e7e) 06:52:02 executing program 1: clone(0x23015000, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)="a0de925b340900c8b7b5a53a69912fab0cb346f6699b64996c84c99223b5c19e54974eb4ec92a3b0454ceb68c0e6f7410adc9f6facd3f795dfbc8d42a45c252a761a042ab2f86f4965c8d42d1239bf00644868dd927f34ca15") prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x9, 0x80000000000000, 0x0, 0x4}, 0x0) socket$inet6(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r0, 0x1000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) 06:52:02 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:02 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) [ 2165.179618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2165.185408][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2165.228769][T25411] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:02 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) 06:52:02 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:02 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x2, 0x0) [ 2165.739622][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2165.745425][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2165.979643][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2165.985426][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2166.139624][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2166.145385][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2169.899635][ C0] net_ratelimit: 18 callbacks suppressed [ 2169.905317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2169.911078][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2170.139630][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2170.145398][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2170.299647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2170.305413][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2170.619606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2170.625391][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2170.859599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2170.865376][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2175.019592][ C1] net_ratelimit: 22 callbacks suppressed [ 2175.019627][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2175.031055][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2175.579609][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2175.585407][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2176.139587][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2176.145357][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2176.379609][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2176.385406][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:13 executing program 0: r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f00000002c0)="7685427801bf9010063037780953c84a646631712cda943146fb570115931dd1993f8043b788d24c1551cefcb5153d20b4e632697c97193502df6deae7b465abb4c921955fb6086244113182b8f313593c4f226eb613cd116ca4a388a9782d215e5884f52b2d77743051d52101ea9e6b5f4732a3001bd238965172bacf7a82f5b4ed470000e28d20a1b63316035911bcc91665ae6e37b5246b01389448912f207cafed83929be5e93185db493494ad2ba5", 0xb1, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f00000006c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000700)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r0}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'crct10dif\x00\x00\x00 \x00\x00\x00+\x00'}}) 06:52:13 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0xe803}, 0x100) 06:52:13 executing program 3: 06:52:13 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 06:52:13 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:52:13 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe"], 0x0, 0x18}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 2176.549581][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2176.555449][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:13 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) 06:52:13 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2176.656169][T25461] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:13 executing program 3: getpid() sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_u='version=9p2000.u'}]}}) [ 2176.714460][T25465] ptrace attach of "/root/syz-executor.3"[25464] was attempted by "/root/syz-executor.3"[25465] 06:52:14 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:14 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, 0x0, 0x0, 0x0) [ 2180.299661][ C0] net_ratelimit: 18 callbacks suppressed [ 2180.299672][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2180.311250][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2180.539627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2180.545436][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2180.699657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2180.705417][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2181.019640][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2181.025415][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2181.259620][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2181.265374][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:52:22 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:22 executing program 0: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CONTROL(r0, 0x80085504, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:52:22 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:52:22 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719dfb87c553a68", @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544"], 0x0, 0x78}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:52:22 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:52:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x15, 0x1, 0x0, 0x0, 0x0, 0x80, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) 06:52:22 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:22 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:52:22 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) [ 2185.044769][T25510] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:22 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:22 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:52:22 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:22 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfbj\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000001680), 0x40000000000020c, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000001680), 0x40000000000020c, 0x0) [ 2185.419594][ C1] net_ratelimit: 22 callbacks suppressed [ 2185.419634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2185.431079][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2185.979614][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2185.985376][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2186.539613][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2186.545378][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2186.779594][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2186.785363][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2186.939720][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2186.945560][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2190.699615][ C0] net_ratelimit: 18 callbacks suppressed [ 2190.699625][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2190.711124][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2190.939573][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2190.945374][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2191.109608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2191.115464][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2191.419611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2191.425488][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2191.659584][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2191.665366][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:52:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:29 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfbj\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000001680), 0x40000000000020c, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000001680), 0x40000000000020c, 0x0) 06:52:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:29 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 06:52:29 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfbj\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000001680), 0x40000000000020c, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000001680), 0x40000000000020c, 0x0) 06:52:29 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:52:29 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x11c}], 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:52:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2192.252275][T25556] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:29 executing program 3: ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:29 executing program 1: [ 2195.819683][ C1] net_ratelimit: 22 callbacks suppressed [ 2195.819692][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2195.831059][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2196.379654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2196.385467][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2196.939634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2196.945438][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2197.179633][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.185438][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2197.339646][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2197.345433][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2201.099598][ C0] net_ratelimit: 18 callbacks suppressed [ 2201.099607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2201.111019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2201.339634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2201.345385][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:38 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev, 'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfbj\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000001680), 0x40000000000020c, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000001680), 0x40000000000020c, 0x0) 06:52:38 executing program 3: ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:38 executing program 1: 06:52:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x0, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:38 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 06:52:38 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x0, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2201.499589][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2201.505393][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:38 executing program 1: 06:52:38 executing program 3: ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x0, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2201.627676][T25598] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:38 executing program 1: 06:52:39 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) [ 2201.819596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2201.825411][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:39 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x0, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2202.059619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2202.065436][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2206.219597][ C1] net_ratelimit: 22 callbacks suppressed [ 2206.219618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2206.231154][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2206.779625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2206.785424][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2207.339608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2207.345413][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2207.579623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2207.585374][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2207.739651][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2207.745464][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_netfilter(0x10, 0x3, 0xc) pipe(&(0x7f0000000080)={0xffffffffffffffff}) connect$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x16, 0xf104340551378d4a}, 0x10) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000000140)) lchown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 06:52:45 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='@ppp1wlan0GPL\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x0, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:45 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, 0x0) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:52:45 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) 06:52:45 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:45 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) [ 2208.074759][T25639] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:45 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:45 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:45 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:45 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x0, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) [ 2211.499611][ C0] net_ratelimit: 18 callbacks suppressed [ 2211.505444][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2211.511207][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2211.739644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2211.745460][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2211.899627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2211.906376][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2212.219598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2212.225345][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2212.459576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2212.465344][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:52:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r0, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 06:52:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:52 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:52 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x1, 0x0) 06:52:52 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, 0x0) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:52:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xff0f, 0x9011, r2, 0x0) 06:52:52 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x1, 0x0) 06:52:52 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) [ 2215.488349][T25691] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved 06:52:52 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) ftruncate(r0, 0x208200) r1 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xff0f, 0x9011, r2, 0x0) 06:52:53 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r0}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r3, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:52:53 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) [ 2216.619653][ C1] net_ratelimit: 22 callbacks suppressed [ 2216.625438][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2216.631212][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2217.179681][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2217.185488][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2217.739694][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2217.745547][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2217.979655][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2217.985457][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2218.139684][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2218.145473][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2221.899640][ C0] net_ratelimit: 18 callbacks suppressed [ 2221.899650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2221.911356][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2222.139606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2222.145494][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2222.309616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2222.315389][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:52:59 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004e80)=[{{&(0x7f0000000340)=@in6={0xa, 0x0, 0x0, @local}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000240)=""/39, 0x27}, {&(0x7f00000003c0)=""/187, 0xbb}, {&(0x7f0000000480)=""/179, 0xb3}], 0x3, &(0x7f0000001a80)=""/244, 0xf4}, 0x72}, {{&(0x7f00000006c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)=""/131, 0x83}, {&(0x7f0000000800)=""/208, 0xd0}], 0x2, &(0x7f0000000940)=""/38, 0x26}, 0x80}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000980)=""/24, 0x18}, {&(0x7f0000000f80)=""/230, 0xe6}, {&(0x7f0000001080)=""/168, 0xa8}, {&(0x7f0000001240)=""/142, 0x8e}, {0x0}, {&(0x7f0000004a00)=""/233, 0xe9}, {&(0x7f0000001480)=""/200, 0xc8}, {&(0x7f0000001580)=""/61, 0x3d}], 0x8, &(0x7f0000001680)=""/174, 0xae}, 0x1}, {{&(0x7f0000001740)=@pptp={0x18, 0x2, {0x0, @initdev}}, 0x80, 0x0, 0x0, &(0x7f0000001c00)=""/33, 0x21}, 0x1}, {{0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000001d00)=""/222, 0xde}, {&(0x7f0000001e00)=""/225, 0xe1}, {&(0x7f0000001f00)=""/152, 0x98}, {&(0x7f0000001fc0)=""/231, 0xe7}, {&(0x7f00000020c0)=""/25, 0x19}, {0x0}], 0x6}}, {{0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000002400)=""/204, 0xcc}, {&(0x7f0000002500)=""/245, 0xf5}], 0x2, &(0x7f0000002700)=""/199, 0xc7}, 0x2}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002800)=""/17, 0x11}, {&(0x7f0000002840)=""/228, 0xe4}], 0x2, &(0x7f0000002980)=""/4084, 0xff4}}, {{0x0, 0x0, &(0x7f0000004d00), 0x0, &(0x7f0000004d80)=""/237, 0xed}, 0xfffffffe}], 0x8, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000180)={0x50d, @time, 0x40, {0xb, 0x92}, 0x2, 0x1, 0x80}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) 06:52:59 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x0, 0x5}, 0x10) sendmmsg(r0, &(0x7f000000a780)=[{{&(0x7f0000005ac0)=@tipc=@name, 0x80, 0x0}}], 0x1, 0x0) 06:52:59 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:52:59 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) 06:52:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f078f12b71406822ddc8af61121be129ca878cd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf400d106b9695b64ffa2c3dde8a49f64f82b188b9fdbd95ddbf7f18ac501460e1251d1f43718384f34e50b2c0e6bdf4069f29b6b1549e82a382687b6b79e18c01668c02a3c8aca5497eb78d70e80aa0b23365f8811998c3677b31e2aecdd643aaab724f6e98de32fcf0d24e7da1b77bb65f06ddb724a1059edfc56194b"], 0x14}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:52:59 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, 0x0) ioctl$sock_ifreq(r3, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2222.619581][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2222.625502][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2222.671912][T25727] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 06:53:00 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 2222.712939][T25733] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 06:53:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f078f12b71406822ddc8af61121be129ca878cd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf400d106b9695b64ffa2c3dde8a49f64f82b188b9fdbd95ddbf7f18ac501460e1251d1f43718384f34e50b2c0e6bdf4069f29b6b1549e82a382687b6b79e18c01668c02a3c8aca5497eb78d70e80aa0b23365f8811998c3677b31e2aecdd643aaab724f6e98de32fcf0d24e7da1b77bb65f06ddb724a1059edfc56194b"], 0x14}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:00 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:53:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff81, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10}]}, 0x30}}, 0x0) [ 2222.841684][T25735] bond0: (slave bond_slave_1): Error: Device is in use and cannot be enslaved [ 2222.859599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2222.865408][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:53:00 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) [ 2223.021870][T25744] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2223.047150][T25750] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 2223.077349][T25750] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:53:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f078f12b71406822ddc8af61121be129ca878cd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf400d106b9695b64ffa2c3dde8a49f64f82b188b9fdbd95ddbf7f18ac501460e1251d1f43718384f34e50b2c0e6bdf4069f29b6b1549e82a382687b6b79e18c01668c02a3c8aca5497eb78d70e80aa0b23365f8811998c3677b31e2aecdd643aaab724f6e98de32fcf0d24e7da1b77bb65f06ddb724a1059edfc56194b"], 0x14}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2223.161770][T25753] netlink: 'syz-executor.4': attribute type 16 has an invalid length. [ 2223.210043][T25753] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2223.350493][T25760] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2227.019572][ C1] net_ratelimit: 22 callbacks suppressed [ 2227.019581][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2227.031013][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2227.579629][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2227.585553][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2228.139610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2228.145397][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2228.379607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2228.385463][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2228.539596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2228.545381][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff81, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10}]}, 0x30}}, 0x0) 06:53:07 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:53:07 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:53:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0xb, 0x0, &(0x7f0000000040)) 06:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe52, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1400000022000104000000a6ffffffffffffffe28f139814a2b0bf0b6511932bfa21a9ba54615f6d349dab4f078f12b71406822ddc8af61121be129ca878cd55927a3d6d4ee9a52d00003ec6cf5f2b916620e885549ca6df674f8e5800f9fe4e3527417b9b0c1412faf400d106b9695b64ffa2c3dde8a49f64f82b188b9fdbd95ddbf7f18ac501460e1251d1f43718384f34e50b2c0e6bdf4069f29b6b1549e82a382687b6b79e18c01668c02a3c8aca5497eb78d70e80aa0b23365f8811998c3677b31e2aecdd643aaab724f6e98de32fcf0d24e7da1b77bb65f06ddb724a1059edfc56194b"], 0x14}}, 0x0) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:07 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2229.942554][T25773] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 06:53:07 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x37, 0x0, &(0x7f0000000040)) 06:53:07 executing program 3: syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(0xffffffffffffffff, 0x80045518, &(0x7f0000000000)=0xffffffff) 06:53:07 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:53:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2230.083678][T25781] bond0: (slave bond_slave_1): Releasing backup interface 06:53:07 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000080)}, 0x20) 06:53:07 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, 0x0) [ 2232.299653][ C0] net_ratelimit: 18 callbacks suppressed [ 2232.299669][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2232.311168][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2232.539672][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2232.545450][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2232.699644][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2232.705465][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2233.019611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2233.025390][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2233.259645][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2233.265405][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2236.141741][T25812] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 2236.177825][T25812] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 06:53:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff81, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10}]}, 0x30}}, 0x0) 06:53:13 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x48, 0x0, &(0x7f0000000040)) 06:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:13 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, 0x0, &(0x7f0000000080)}, 0x20) 06:53:13 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, 0x0) 06:53:13 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:53:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:13 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, 0x0) 06:53:13 executing program 4: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000d, 0x12, r0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_int(r1, 0x29, 0x1d, 0x0, &(0x7f0000000040)) 06:53:13 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, 0x0, &(0x7f0000000080)}, 0x20) 06:53:14 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x1081082) 06:53:14 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2237.419676][ C1] net_ratelimit: 22 callbacks suppressed [ 2237.425341][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2237.431120][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2237.979652][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2237.985469][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2238.539619][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2238.545371][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2238.779657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2238.785408][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2238.939621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2238.945434][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2242.624064][T25858] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 2242.656153][T25858] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 2242.700013][ C0] net_ratelimit: 18 callbacks suppressed [ 2242.700057][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2242.711893][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:20 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xca, 0x0, 0x2}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000440)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x7, 0x80000) add_key$keyring(&(0x7f0000000440)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$search(0xa, r0, 0x0, &(0x7f0000000140)={'syz', 0x1}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400007) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0x20032600) socket$packet(0x11, 0x800002, 0x300) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) syz_genetlink_get_family_id$ipvs(0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, 0x0) 06:53:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:20 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(0xffffffffffffffff, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:53:20 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, 0x0, &(0x7f0000000080)}, 0x20) 06:53:20 executing program 0: r0 = socket$inet6(0xa, 0x2000000000801, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f00000001c0)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20000000, &(0x7f0000f62fe4)={0xa, 0x0, 0x0, @empty}, 0x1c) 06:53:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_CLAIM_PORT(r0, 0x80045518, &(0x7f0000000000)) 06:53:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:20 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x3c) r2 = gettid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write(r3, &(0x7f0000000040)='S', 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x37) ptrace$cont(0x9, r2, 0x0, 0x0) [ 2242.939582][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2242.945391][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:20 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), 0x0}, 0x20) [ 2243.099584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2243.105392][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:20 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1ad) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001a80)=""/34, 0x22}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='status\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x199, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 06:53:20 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), 0x0}, 0x20) [ 2243.419861][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2243.425683][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2243.659728][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2243.665568][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:53:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2247.819625][ C1] net_ratelimit: 22 callbacks suppressed [ 2247.819634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2247.831009][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2248.379659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2248.385422][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2248.939634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2248.945385][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2249.179557][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2249.185309][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2249.339632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2249.345427][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000300)={0x0, 0x0, 0xffffffffffff3ffc}, 0x4) 06:53:29 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) syz_open_dev$evdev(0x0, 0x0, 0x40001) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000800)='blacklist\x00\x96h$\xdb`\x83\xb9\x9cg\x8bk\x00\f\x18\xa0\xce\x92\xb7\x88\xb4B\x82(\x84\xc8[\xf4\x8dl\x94\xe77${\xa1\xaa\x8b;\xa7%\x86[\xd2\xac\xefJ\xb64y\x02\xca\xaaL{h\x06\x1a\x8a\xb0\b\x8b\x04\x00\x00\x00\x00\x00\x00\x00\xcc\x11T;q2#\x8a\xee\x9a\x9b\x99\xf4\x18h!\x84F\xe8\xda\x97;\xf6\x1b\x8e_\xc5X\x03\xf9(\xb9z\xec{\x7fi.#\xf8k\xd1Hf\x04\xc1\"\xae\xb4\xe0\x85\xea\xb19\x13-\x04i\xb5\x92\xe9\x19k\xdajZ=\xd4\x0ec[e\xd3)\xa4Y\xc3V\xaa\x9f\x86,\xf6TKZY\x9cU\xdc\xcb\x89\x96\xed\b\x94k\x16/\xb8\b\x97\xd1Q5\xd6\xe1\x9cjQg\xf5\x99\xaacw\xbd\xea3\xbd\x85\x9d\x9c\xae-d', 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000740)={0x0, @empty}, &(0x7f0000000780)=0xc) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f00000007c0)={@rand_addr="4b3c532b4d2a17ce196ac9e78b49338e", r1}, 0x14) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xd, 0x100000001, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r4, &(0x7f00000001c0), 0x0}, 0x20) 06:53:29 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:53:29 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719dfb87c553a688f9da801891bb3e336624a0a51c1169ab50284810381fdf180daa75aadc0004ffc6e1d9c45bb262480ae58ab2dda9bc528582294f139f5e1ad42a87d93f67fa82141e1528264daf3c0843587546f54bfe715be7131dcc0744d62432f3998bbb64ddd61", @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcb"], 0x0, 0xe8}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:53:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:29 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004e80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x1}], 0x2, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='rpc_pipefs\x00', 0x0, 0x0) [ 2252.261834][T25923] ptrace attach of "/root/syz-executor.4"[25922] was attempted by "/root/syz-executor.4"[25923] 06:53:29 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xfd91) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) 06:53:29 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:29 executing program 2: gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdca, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001e000503ed0080648c6394f20531d20009000f4009000001a00000031800009700d0bdff0f0000000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 06:53:30 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2252.793766][T25944] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2252.829094][T25945] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. 06:53:30 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xfd91) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x13, r0, 0x0) 06:53:30 executing program 2: gettid() ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc020660b, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdca, &(0x7f0000000000)=[{&(0x7f0000000040)="2e0000001e000503ed0080648c6394f20531d20009000f4009000001a00000031800009700d0bdff0f0000000000", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 2253.044082][T25954] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2253.099633][ C0] net_ratelimit: 18 callbacks suppressed [ 2253.099649][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2253.111142][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2253.339601][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2253.345378][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2253.499624][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2253.505392][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2253.819692][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2253.825477][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2254.059592][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2254.066315][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2258.219587][ C1] net_ratelimit: 22 callbacks suppressed [ 2258.219596][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2258.231028][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2258.789659][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2258.795467][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2259.339618][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2259.345377][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:36 executing program 0: 06:53:36 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x2, 0x9, 0x5, 0x9, 0x6}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) tkill(0x0, 0x1000000000013) 06:53:36 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280), 0x0) r0 = getpid() r1 = eventfd(0x81) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000180)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) dup(r1) ioprio_get$uid(0x3, 0x0) clock_gettime(0x5, &(0x7f00000002c0)) write(0xffffffffffffffff, 0x0, 0x0) 06:53:36 executing program 3: 06:53:36 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 06:53:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xffff, &(0x7f0000000140)) 06:53:36 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2259.579599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2259.585762][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2259.749839][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2259.755961][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:37 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$hfsplus(&(0x7f0000000000)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@force='force'}]}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 06:53:37 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x0, &(0x7f0000000240)={'bond0\x00\xe1\x03\n\x00!!\x00\x01\x00', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 2260.604044][T25999] hfsplus: unable to find HFS+ superblock [ 2263.499595][ C0] net_ratelimit: 18 callbacks suppressed [ 2263.499611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.511029][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:40 executing program 0: 06:53:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x200000000000011, 0x80000000000003, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) 06:53:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:40 executing program 3: unshare(0x28000000) r0 = mq_open(&(0x7f00000002c0)='\\\xf7\xa0\xcc\x16H-o\x007\xe6\xb3\x1a\x8eiz\xdd06P\xd4\x88\x00s\xefu\xdfa\x01y\xde\xc26\xaa\x04\xe9F\x87y\xba\a\x00\x00\x00\x00\x00\x00\x005\x98U\xb4\x9b\x88\x9b\xb5\xe4\x9b5\x8ey:oz\xf5\'f\xd6\xfe\x93\xca\x06r\xac\x1b\x8a\x87\xcafw\xd5\"\x0f\xb7|\xb6\x13\xb3\xdb\x91\x04\xd1j\xa1\xcal\xc7jt\xe7\xbdK\xdcR&u{\x03\xf8[\x01\x03$Wl@\xc1\xc8e\\s\x9f\xc1\xa6\x8d\xf5\xe2\xbc\xb6\xe5\xedF\xc8(\x9eH\xeau\xe7\x85\xeb]d\x97\xcd#;\x10\xb9\x182\xcf^1v|\x1cA\x9dFF\xcd\x88?%', 0x6e93ebbbc80884f2, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r2) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mq_getsetattr(r0, &(0x7f0000000240)={0x800}, 0x0) 06:53:40 executing program 2: 06:53:40 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, 0x0) [ 2263.739816][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.745891][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:41 executing program 2: [ 2263.910121][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2263.916634][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:41 executing program 2: [ 2264.220278][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2264.226573][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:41 executing program 2: 06:53:41 executing program 4: [ 2264.459585][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2264.465412][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2268.619647][ C1] net_ratelimit: 22 callbacks suppressed [ 2268.625310][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2268.631080][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2269.179692][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2269.185759][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2269.739566][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2269.745461][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:47 executing program 0: 06:53:47 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, 0x0) 06:53:47 executing program 3: 06:53:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:47 executing program 4: 06:53:47 executing program 2: 06:53:47 executing program 3: [ 2269.979591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2269.985531][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:47 executing program 2: 06:53:47 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:47 executing program 4: [ 2270.139620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2270.145414][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:47 executing program 3: 06:53:47 executing program 2: [ 2273.899638][ C0] net_ratelimit: 18 callbacks suppressed [ 2273.899647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2273.911097][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2274.139634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.145399][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2274.299642][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.305412][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2274.619640][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.625418][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2274.859621][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2274.865403][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:53:53 executing program 0: 06:53:53 executing program 3: 06:53:53 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:53 executing program 2: 06:53:53 executing program 4: 06:53:53 executing program 5: syz_open_dev$amidi(&(0x7f0000000180)='/dev/amidi#\x00', 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getresgid(&(0x7f00000002c0), 0x0, 0x0) r0 = getpid() sendmsg$alg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x80) sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(0xffffffffffffffff, 0xc040564b, &(0x7f00000003c0)={0x7ff, 0x0, 0x600f, 0x0, 0x2, {0x0, 0x2020}}) ioctl$sock_ifreq(r3, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) ioctl$sock_ifreq(r3, 0x8990, 0x0) 06:53:53 executing program 2: 06:53:53 executing program 3: 06:53:53 executing program 4: 06:53:53 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:53 executing program 2: 06:53:53 executing program 3: 06:53:53 executing program 4: [ 2279.019597][ C1] net_ratelimit: 22 callbacks suppressed [ 2279.019607][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2279.031053][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2279.579634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2279.585397][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2280.139597][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2280.145504][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:57 executing program 0: 06:53:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:57 executing program 2: 06:53:57 executing program 3: 06:53:57 executing program 4: 06:53:57 executing program 5: [ 2280.379585][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2280.385377][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:57 executing program 2: 06:53:57 executing program 5: 06:53:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000280)=0x0) io_submit(r2, 0x0, 0x0) io_cancel(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:53:57 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:53:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000001340)=@hci, 0x80, 0x0}}], 0x568, 0x0) [ 2280.539584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2280.545371][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:53:58 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 2281.077926][T26143] usb usb7: usbfs: process 26143 (syz-executor.2) did not claim interface 0 before use [ 2281.099356][T26143] vhci_hcd: default hub control req: 0100 v0000 i0000 l0 [ 2284.299627][ C0] net_ratelimit: 18 callbacks suppressed [ 2284.299641][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2284.311067][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:01 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='net/icmp\x00') syz_open_procfs(0x0, &(0x7f0000000000)='uid_map\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fc00004}]}) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1fb}, 0x0, 0x0) 06:54:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:54:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:01 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) read(0xffffffffffffffff, &(0x7f0000000380)=""/108, 0x6c) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) 06:54:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x1, 0x42) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18}, 0xfffffd86) 06:54:01 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='@ppp1wlan0GPL\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat(0xffffffffffffff9c, 0x0, 0x0, 0x80) read(r2, &(0x7f0000000000)=""/17, 0xfffffcd6) [ 2284.539601][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2284.545405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2284.709568][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2284.709620][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:02 executing program 5: 06:54:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x1, 0x42) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18}, 0xfffffd86) 06:54:02 executing program 3: [ 2285.019579][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2285.025385][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:02 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000000000000ac340005020000005a606325000000e8fe0fffffffffffffffc131109400130000000000ffff"], 0x0, 0x31}, 0x20) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') [ 2285.259673][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2285.265487][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2289.419571][ C1] net_ratelimit: 22 callbacks suppressed [ 2289.419580][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2289.431067][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2289.979607][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2289.985423][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2290.539591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2290.545363][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2290.779615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2290.785407][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2290.939601][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2290.945386][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:09 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair(0x0, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 06:54:09 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x0) 06:54:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x1, 0x42) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18}, 0xfffffd86) 06:54:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3, 0x4002011, r2, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfefd, 0x0, 0x0, 0xfffffffffffffd9c) 06:54:09 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='@ppp1wlan0GPL\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000000)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat(0xffffffffffffff9c, 0x0, 0x0, 0x80) read(r2, &(0x7f0000000000)=""/17, 0xfffffcd6) [ 2291.955844][T26196] debugfs: Directory '26196-4' with parent 'kvm' already present! 06:54:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sched_setattr(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) 06:54:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x1, 0x42) write$P9_RCREATE(r0, &(0x7f0000000000)={0x18}, 0xfffffd86) 06:54:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x118}], 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:54:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:09 executing program 5: rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) r0 = getpgrp(0x0) r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0xb, &(0x7f0000000100)) rt_sigtimedwait(&(0x7f0000000200)={0x7fffffffffffff66}, 0x0, 0x0, 0x8) [ 2294.699598][ C0] net_ratelimit: 18 callbacks suppressed [ 2294.699615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2294.711046][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2294.939606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2294.945364][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2295.099631][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2295.105383][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2295.419619][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2295.425429][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2295.659638][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2295.665402][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2299.819595][ C1] net_ratelimit: 22 callbacks suppressed [ 2299.819605][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2299.831094][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2300.185670][ T26] audit: type=1804 audit(1572764057.426:84): pid=26238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir145141486/syzkaller.4iWGud/1291/memory.events" dev="sda1" ino=16564 res=1 [ 2300.379700][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2300.385831][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2300.939604][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2300.945402][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2301.179602][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2301.185410][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') socketpair(0x0, 0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 2301.339615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2301.345386][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:18 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c78451263e89b"], 0x21) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x800448d2, &(0x7f0000000340)={'veth0\x00'}) fchdir(r3) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) socket(0x10, 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000000c0)) prctl$PR_CAPBSET_DROP(0x18, 0x9) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x20000, 0x0) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@alg, &(0x7f0000000140)=0x80, 0x80000) prctl$PR_SET_PTRACER(0x59616d61, r0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000004c0)='veno\x00', 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0xffffffffffffffff, 0x7, 0x11) ptrace$setopts(0x4206, r0, 0x0, 0x0) 06:54:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x50d060000) 06:54:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:18 executing program 5: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000240)='threaded\x00', 0xfb3f) 06:54:18 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') [ 2301.497557][ T26] audit: type=1804 audit(1572764058.736:85): pid=26251 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir296912021/syzkaller.u5QKXZ/318/file0" dev="sda1" ino=16760 res=1 06:54:18 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) 06:54:18 executing program 5: r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x0) 06:54:18 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0xff0f, 0x9011, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00017, 0x0, 0x0, 0x0, 0x0) [ 2301.615522][ T26] audit: type=1804 audit(1572764058.856:86): pid=26256 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir296912021/syzkaller.u5QKXZ/318/file0" dev="sda1" ino=16760 res=1 06:54:18 executing program 3: r0 = gettid() r1 = creat(&(0x7f0000000100)='./file0\x00', 0x10003) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="01e23ddf45f1f8eddb8ee3440fa2f84c99f10cc6297fa1b9b3853c78451263e89b"], 0x21) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x800448d2, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x3, 0x6) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x800448d2, &(0x7f0000000340)={'veth0\x00'}) fchdir(r3) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', 0x0, 0x0, 0x1) socket(0x10, 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f00000000c0)) prctl$PR_CAPBSET_DROP(0x18, 0x9) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x20000, 0x0) accept4(0xffffffffffffffff, &(0x7f00000003c0)=@alg, &(0x7f0000000140)=0x80, 0x80000) prctl$PR_SET_PTRACER(0x59616d61, r0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f00000004c0)='veno\x00', 0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x200000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0xffffffffffffffff, 0x7, 0x11) ptrace$setopts(0x4206, r0, 0x0, 0x0) 06:54:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0xf8}, 0x8}, 0x0) [ 2302.027242][ T26] audit: type=1804 audit(1572764059.266:87): pid=26277 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir296912021/syzkaller.u5QKXZ/319/file0" dev="sda1" ino=16766 res=1 [ 2305.099669][ C0] net_ratelimit: 18 callbacks suppressed [ 2305.105414][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2305.111237][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2305.339641][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2305.345428][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2305.499650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2305.505450][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2305.819620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2305.825382][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2306.059570][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2306.065347][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2307.673105][ T26] audit: type=1804 audit(1572764064.916:88): pid=26287 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir145141486/syzkaller.4iWGud/1292/memory.events" dev="sda1" ino=16758 res=1 06:54:25 executing program 5: sendmsg(0xffffffffffffffff, 0x0, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000040)=@id, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000100)=0x6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0x958, 0x11, 0x0, 0x27) 06:54:25 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x8001, 0x0]) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000003a80)=""/126) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:54:25 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:25 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0, 0xfffffffffffffced}, {&(0x7f0000000380)="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", 0x141}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:54:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) 06:54:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x2044061, 0x0) 06:54:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) [ 2307.988896][T26295] ptrace attach of "/root/syz-executor.4"[26294] was attempted by "/root/syz-executor.4"[26295] 06:54:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r2, r0, 0x0, 0xb60) 06:54:25 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:25 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}]}}) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f0000000480)) 06:54:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, 0x0, 0x0) 06:54:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f000066fff4)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendfile(r2, r0, 0x0, 0xb60) [ 2308.641885][T26322] sysfs: Unknown parameter 'fd' 06:54:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) keyctl$join(0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) r5 = socket(0x10, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000240)=[{r4, 0x8040}, {r3}, {r5, 0x2008}, {}], 0x4, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 2308.684808][T26325] sysfs: Unknown parameter 'fd' [ 2310.219588][ C1] net_ratelimit: 22 callbacks suppressed [ 2310.219598][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2310.231024][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2310.779630][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2310.785486][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2311.339616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2311.345406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2311.579623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2311.585415][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2311.739592][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2311.745354][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2315.499577][ C0] net_ratelimit: 18 callbacks suppressed [ 2315.505246][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2315.511033][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2315.739587][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2315.745478][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2315.899598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2315.905448][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2316.219618][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2316.225394][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2316.459609][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2316.465384][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:54:33 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x8001, 0x0]) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000003a80)=""/126) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:54:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8}, 0x0) 06:54:33 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='#! ./file0\t'], 0xb) close(r0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000100)=@nat={'nat\x00', 0x19, 0x4, 0x590, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"]}, 0x608) dup(0xffffffffffffffff) 06:54:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000200)='F', 0x1, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$get_security(0x11, r1, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000140)={'hwsim0\x00', {0x2, 0x4e24, @multicast2}}) keyctl$invalidate(0x15, r1) accept$packet(0xffffffffffffffff, &(0x7f0000009500), &(0x7f0000009540)=0x14) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) connect(r4, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r5 = gettid() r6 = gettid() sendmmsg$unix(r4, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r5}}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r6}}}], 0x70}], 0xfd, 0x0) syz_genetlink_get_family_id$tipc2(0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='v7\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) 06:54:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) keyctl$join(0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) r5 = socket(0x10, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x0) ppoll(&(0x7f0000000240)=[{r4, 0x8040}, {r3}, {r5, 0x2008}, {}], 0x4, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 06:54:33 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x8001, 0x0]) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000003a80)=""/126) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:54:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8}, 0x0) 06:54:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x8001, 0x0]) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000003a80)=""/126) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:54:34 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x8}, 0x0) [ 2317.192299][T26391] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 2320.619595][ C1] net_ratelimit: 22 callbacks suppressed [ 2320.619605][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2320.630990][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2321.179610][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2321.185474][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2321.739662][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2321.745458][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:39 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000080)=[0x8001, 0x0]) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000003a80)=""/126) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 06:54:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:39 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000200)='F', 0x1, 0xfffffffffffffffe) keyctl$setperm(0x5, r1, 0x0) keyctl$get_security(0x11, r1, 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f0000000140)={'hwsim0\x00', {0x2, 0x4e24, @multicast2}}) keyctl$invalidate(0x15, r1) accept$packet(0xffffffffffffffff, &(0x7f0000009500), &(0x7f0000009540)=0x14) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) connect(r4, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r5 = gettid() r6 = gettid() sendmmsg$unix(r4, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r5}}}, @rights={{0x14, 0x1, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r6}}}], 0x70}], 0xfd, 0x0) syz_genetlink_get_family_id$tipc2(0x0) socket$inet6(0xa, 0x1000000000002, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6000, 0x1) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=ANY=[], &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='v7\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)) clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) 06:54:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180), 0x8}, 0x0) 06:54:39 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) keyctl$join(0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) write(0xffffffffffffffff, 0x0, 0x0) ppoll(&(0x7f0000000240)=[{r3}, {r2}, {0xffffffffffffffff, 0x2008}], 0x3, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 06:54:39 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000100)=0x50d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) 06:54:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') [ 2321.979635][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2321.985450][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:39 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180), 0x8}, 0x0) 06:54:39 executing program 5: [ 2322.139580][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2322.145392][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:39 executing program 4: 06:54:39 executing program 3: 06:54:39 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') [ 2325.899604][ C0] net_ratelimit: 18 callbacks suppressed [ 2325.899614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2325.911077][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2326.139567][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2326.145341][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2326.299608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2326.305375][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2326.619671][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2326.625442][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2326.859613][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2326.865379][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:54:45 executing program 0: 06:54:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180), 0x8}, 0x0) 06:54:45 executing program 5: 06:54:45 executing program 3: 06:54:45 executing program 4: 06:54:45 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:45 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}, 0x8}, 0x0) 06:54:45 executing program 4: 06:54:45 executing program 3: 06:54:45 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:45 executing program 5: 06:54:46 executing program 4: [ 2331.019595][ C1] net_ratelimit: 22 callbacks suppressed [ 2331.025251][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2331.030969][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2331.579654][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2331.585460][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2332.139617][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2332.145384][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2332.379583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2332.385342][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:49 executing program 0: 06:54:49 executing program 5: 06:54:49 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}, 0x8}, 0x0) 06:54:49 executing program 3: 06:54:49 executing program 4: [ 2332.539626][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2332.545462][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:54:49 executing program 5: 06:54:49 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0], 0x3}, 0x8}, 0x0) 06:54:50 executing program 4: 06:54:50 executing program 3: 06:54:50 executing program 2: sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:50 executing program 5: [ 2336.299634][ C0] net_ratelimit: 18 callbacks suppressed [ 2336.299650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2336.311123][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2336.539612][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2336.545379][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2336.699716][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2336.705499][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2337.019608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2337.025406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2337.259628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2337.265452][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:54:56 executing program 0: 06:54:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x4}, 0x8}, 0x0) 06:54:56 executing program 3: 06:54:56 executing program 2: sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:56 executing program 4: 06:54:56 executing program 5: 06:54:56 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x4}, 0x8}, 0x0) 06:54:56 executing program 2: sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:54:56 executing program 5: 06:54:56 executing program 3: 06:54:56 executing program 4: 06:54:56 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') [ 2341.419582][ C1] net_ratelimit: 22 callbacks suppressed [ 2341.419592][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2341.431021][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2341.979634][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2341.985578][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2342.539582][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2342.545355][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2342.779605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2342.785360][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2342.939592][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2342.945444][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:00 executing program 0: 06:55:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB], 0x4}, 0x8}, 0x0) 06:55:00 executing program 4: 06:55:00 executing program 3: 06:55:00 executing program 5: 06:55:00 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:00 executing program 3: 06:55:00 executing program 4: 06:55:00 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:00 executing program 5: 06:55:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/88], 0x4}, 0x8}, 0x0) 06:55:00 executing program 3: [ 2346.699590][ C0] net_ratelimit: 18 callbacks suppressed [ 2346.699599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2346.711054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2346.939610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2346.945372][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2347.099587][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2347.105396][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:04 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0xff) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) 06:55:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/88], 0x4}, 0x8}, 0x0) 06:55:04 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) 06:55:04 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000600)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)=@ethtool_eeprom={0x4b, 0x18}}) 06:55:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 2347.419586][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2347.425515][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:04 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/88], 0x4}, 0x8}, 0x0) [ 2347.451255][ T26] audit: type=1804 audit(1572764104.696:89): pid=26584 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir505506091/syzkaller.5NYJbs/397/memory.events" dev="sda1" ino=17156 res=1 06:55:04 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, 0x0, 0x0) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, 0x0, &(0x7f0000000600)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'erspan0\x00', &(0x7f0000000000)=@ethtool_eeprom={0x4b, 0x18}}) [ 2347.659609][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2347.665708][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:55:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/132], 0x4}, 0x8}, 0x0) 06:55:05 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) r5 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:55:05 executing program 4: [ 2348.242030][ T26] audit: type=1804 audit(1572764105.446:90): pid=26614 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir505506091/syzkaller.5NYJbs/397/memory.events" dev="sda1" ino=17156 res=1 [ 2351.819607][ C1] net_ratelimit: 22 callbacks suppressed [ 2351.825278][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2351.831032][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2352.379665][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2352.385462][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2352.939634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2352.945405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2353.179591][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2353.185359][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2353.339627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2353.345379][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) 06:55:12 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/132], 0x4}, 0x8}, 0x0) 06:55:12 executing program 4: 06:55:12 executing program 5: 06:55:12 executing program 3: 06:55:13 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1070, 0xc, 0x10, r0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0x60e, 0x68) 06:55:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/132], 0x4}, 0x8}, 0x0) 06:55:13 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/154], 0x4}, 0x8}, 0x0) [ 2357.099673][ C0] net_ratelimit: 18 callbacks suppressed [ 2357.105353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2357.111105][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2357.339614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2357.345363][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2357.499705][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2357.505483][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2357.819615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2357.825441][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2358.059619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2358.065383][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:55:19 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:19 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/154], 0x4}, 0x8}, 0x0) 06:55:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:19 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/154], 0x4}, 0x8}, 0x0) [ 2362.219591][ C1] net_ratelimit: 22 callbacks suppressed [ 2362.219606][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2362.231093][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:55:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:19 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x303, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) select(0x0, 0x0, 0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0xaaaaaaaaaaaab31, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x2c3, 0x400}], 0x1, 0x0) 06:55:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/165], 0x4}, 0x8}, 0x0) [ 2362.779626][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2362.785458][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2362.793931][T26703] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 2363.339585][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.345340][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2363.458221][T26723] EXT4-fs (loop5): bad geometry: block count 1080 exceeds size of device (1 blocks) [ 2363.579628][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.585404][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2363.739646][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2363.745453][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2367.499596][ C0] net_ratelimit: 18 callbacks suppressed [ 2367.499605][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2367.511074][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2367.739606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2367.745391][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2367.899600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2367.905412][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2368.219614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2368.225430][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2368.459566][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2368.465378][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:55:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x2044061, 0x0) 06:55:26 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/165], 0x4}, 0x8}, 0x0) 06:55:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:26 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r5 = openat$cgroup_ro(r4, &(0x7f0000000180)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00"/165], 0x4}, 0x8}, 0x0) 06:55:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) 06:55:27 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) 06:55:27 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:27 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x4}, 0x8}, 0x0) [ 2372.619613][ C1] net_ratelimit: 22 callbacks suppressed [ 2372.625283][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2372.631050][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2373.179647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2373.185437][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2373.739574][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2373.745422][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2373.979599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2373.985381][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2374.139609][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2374.145438][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x4}, 0x8}, 0x0) 06:55:33 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r5 = openat$cgroup_ro(r4, &(0x7f0000000180)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000"], 0x4}, 0x8}, 0x0) 06:55:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000"], 0x4}, 0x8}, 0x0) 06:55:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x0, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000"], 0x4}, 0x8}, 0x0) 06:55:33 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x0, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:34 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) 06:55:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') r5 = openat$cgroup_ro(r4, &(0x7f0000000180)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd6026f52600081100fe8000000000000000000000040000bbff02000000000000000000000000000102004e220008907852a98f8babc5"], 0x0) [ 2384.379595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.385418][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:41 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000"], 0x4}, 0x8}, 0x0) 06:55:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x146}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 06:55:41 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) [ 2384.539606][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2384.545407][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:41 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000"], 0x4}, 0x8}, 0x0) [ 2388.299630][ C0] net_ratelimit: 18 callbacks suppressed [ 2388.299660][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2388.311083][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2388.539574][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2388.545337][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2388.699610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2388.705416][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2389.019600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2389.025361][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2389.259609][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2389.265363][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2390.606846][ T26] audit: type=1804 audit(1572764147.846:91): pid=26897 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir145141486/syzkaller.4iWGud/1305/bus" dev="sda1" ino=16818 res=1 [ 2390.632669][ T26] audit: type=1804 audit(1572764147.876:92): pid=26898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir145141486/syzkaller.4iWGud/1305/bus" dev="sda1" ino=16818 res=1 06:55:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000040)="a48b1bf72801002b4d2f2fba4fad273b1ea3e46f905080af4c90ccb15322e2df00000000000000960f530000010000000000772cf2ee001f6c9ad54ac45a4a0c245dd58849963e3f6576", 0x4a}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:55:47 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:47 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) [ 2390.658676][ T26] audit: type=1804 audit(1572764147.876:93): pid=26898 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir145141486/syzkaller.4iWGud/1305/bus" dev="sda1" ino=16818 res=1 06:55:47 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000"], 0x4}, 0x8}, 0x0) 06:55:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") ioctl$sock_rose_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f00000002c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @null, @rose={'rose', 0x0}, 0x1, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYPTR64], 0xfe9d) connect$bt_rfcomm(r1, &(0x7f0000000140)={0x1f, {0x60, 0x3a, 0x23, 0x8, 0xff, 0x1}, 0x2}, 0xa) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xcf}) socket(0x1, 0x2, 0x0) r2 = socket(0x1, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f00000000c0)={'veth0_to_team\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="2600000080010000000000000000000000000000000000000000000000000000000000000000000000000000b2024718877d182e81ba1563978bdfb1dc72b9fc5982fcae5eef48d91423c0bc3803547c4d43c9cb44f1ce1f2ab94d1ef0a697db589264f414f12fc9ca7579f947f420d66637df2e79bbef533f9be227b1a718efe3b1af513689cdf7215b"]}) 06:55:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:55:48 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:48 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:48 executing program 5: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r0 = gettid() r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000280)={0x0, 0x0}) kcmp(r2, r0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) 06:55:48 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:48 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) [ 2393.419606][ C1] net_ratelimit: 22 callbacks suppressed [ 2393.425289][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2393.431086][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2393.979636][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2393.985500][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2394.539589][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.545336][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2394.779584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.785332][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2394.939611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2394.945406][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:55:54 executing program 0: unshare(0x40000000) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000fc4000)={0x2, 0x0, @loopback}, 0x10) sendmmsg(r0, &(0x7f0000573000)=[{{&(0x7f0000000000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0}}], 0x1, 0x0) 06:55:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:54 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x1) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000400)={'filter\x00', 0x0, 0x0, 0x0, [], 0x0, &(0x7f0000000100)}, 0x78) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000280)="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", 0x1192aca8268c9077, 0x8803, 0x0, 0xffffffffffffff48) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f0000000200)={0x0, 0x989680}, 0x0, 0x0) 06:55:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:55:54 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:54 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:55:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:54 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) [ 2398.699584][ C0] net_ratelimit: 18 callbacks suppressed [ 2398.699594][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2398.711032][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2398.939614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2398.945427][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2399.099628][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2399.105432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2399.419598][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2399.425447][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2399.659575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2399.665350][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:55:59 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001640)=ANY=[@ANYBLOB="140000000301ffff808fc201000000000000101b5c46433a985ba119062e9eab80cc3321f24b5548de49ba95685bbe09bcd3768d4929c15da7a0fdde107fe5dfd1fe0d579716aec342db43f69da4c089cea582ff010000000000"], 0x5a}}, 0x0) 06:55:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:59 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/64, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:55:59 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000013) 06:55:59 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f00000001c0)='bond0\x00') 06:55:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:59 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:55:59 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:55:59 executing program 5: 06:55:59 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) [ 2403.819618][ C1] net_ratelimit: 22 callbacks suppressed [ 2403.825291][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2403.831010][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2404.379613][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2404.385371][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2404.939588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2404.945402][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2405.179657][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2405.185438][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2405.339646][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2405.345421][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:56:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:03 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) 06:56:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:56:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:56:03 executing program 0: 06:56:03 executing program 5: 06:56:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:56:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x3}, 0x8}, 0x0) 06:56:03 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:56:03 executing program 5: 06:56:03 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0xffffffffffffff6b, &(0x7f0000000100), 0x0, 0x0, 0x2ac}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe) socketpair(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) 06:56:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:56:04 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) [ 2409.099619][ C0] net_ratelimit: 18 callbacks suppressed [ 2409.105363][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.111082][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.339645][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.345453][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.499628][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.505405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2409.819603][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2409.825367][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2410.059593][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2410.065393][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:56:07 executing program 0: 06:56:07 executing program 2: 06:56:07 executing program 5: 06:56:07 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:07 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:56:07 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:08 executing program 2: 06:56:08 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='attr/prev\x00') r1 = memfd_create(&(0x7f0000000300)='keyringsycgroup\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8d\xafS\xb7(\xd7\xd5d\xe6\t\xd10xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$vfat(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x2044061, 0x0) 06:56:12 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e000000200"/32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:12 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:12 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x1f4, 0x0, 0x240) 06:56:12 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000500)='/dev/nullb0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x1dc51000, 0x0, 0x2012, r0, 0x0) [ 2415.339608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.345392][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:56:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) [ 2415.579607][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.585384][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2415.739850][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2415.745838][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2419.499570][ C0] net_ratelimit: 18 callbacks suppressed [ 2419.499579][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.510990][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2419.739600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.745371][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2419.899628][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2419.905392][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2420.219593][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2420.225407][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2420.469582][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2420.475380][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:56:19 executing program 0: 06:56:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e000000200"/32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:19 executing program 5: socket$inet(0x2, 0x4000000000000001, 0x0) pipe(&(0x7f0000000140)) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x361081, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) 06:56:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:19 executing program 2: 06:56:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30}, 0x30) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000001340)=@hci, 0x80, 0x0}}], 0x568, 0x0) 06:56:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e000000200"/32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbb24fec2fba09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x3) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14, 0x3e8}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 06:56:19 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) [ 2424.619637][ C1] net_ratelimit: 22 callbacks suppressed [ 2424.625343][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2424.631087][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2425.179647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.185439][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2425.739637][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.745409][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2425.979588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2425.985348][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2426.139615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2426.145488][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:56:25 executing program 0: 06:56:25 executing program 5: 06:56:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30}, 0x30) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000001340)=@hci, 0x80, 0x0}}], 0x568, 0x0) 06:56:25 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:26 executing program 5: 06:56:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/48, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:26 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:26 executing program 5: 06:56:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f00000000c0)={0x30}, 0x30) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000006f40)=[{{&(0x7f00000000c0)=@hci, 0x80, 0x0}}, {{&(0x7f0000001340)=@hci, 0x80, 0x0}}], 0x568, 0x0) [ 2429.899601][ C0] net_ratelimit: 18 callbacks suppressed [ 2429.905429][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2429.911200][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2430.140781][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2430.146546][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2430.299647][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2430.305448][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2430.619609][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2430.625367][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2430.859599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2430.865357][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:56:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:30 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="bf16000000000000b707000001000000407000000cc1e9cacf7000000000000095002700000000007c841fb71916411c22f93aedcd0efe455d0445fb70fc5b4e982e61aa7d1f9fb288ae1a7763bf71d619c1ba6e53657b0900c5bb722909be1e9d1b2420a6e7fae8bc5e5c45d8cfc8c5160d3ef5e245005b7e4570bb048d2e9ec9b5d29ab9e06bdb4144978fac3fba2eaa07058b52fb95eaa1837a312320fd387d1abcfb3e39c2d4ee7cf300"/196], &(0x7f0000000140)='vS\xfdIG|\x8aL[\xf2\'\x9c\xea\xb1\xc0\xb1\x19\x91\x9d/Q\xd9\xe3T\xce\xdax;\x02%\xc5\x1c\xd5GA\xad[(\xbblZ\x01\x1dF\x92#]%sj\xd0i\xc6C\x1f&\xe2\xc5\xa5z\x7f\xe1 \xfb\xc27\x03\x84\x8e\xef\x82-\xfc$$\xaf\v\xbd\x95\x1e\x0f\xbeVI\xec\r!\f\x86\xf5\xfb[Y\x1e\xd4\xdfc\xb1\xc8\xa2\xc1/5\xffr\x1f\x80@\xb8F\xea\xde\x93\xa1\xcb6\xee\xf2\xce\x95\xf2\xfdxR\x17F\xad\xc1~\xa2\x97=O^o\"\xbb\xa8\x9746'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0xe, 0x0, &(0x7f0000000200)="bc4f0c3f69ddb10d28d098f118fa", 0x0, 0x0, 0x0, 0xb1, 0x0, &(0x7f00000004c0)="0e72f34faec578b4f5bf126a6d843fb91efb468ce11743c55d8d1338a496cb092abdc8d7cd46c7a8238ec4bf317e7217bba36b7e1aa84ee0fd0be42a83dc0e7b4c8e7d024c06df44a18cf735f25744c78dc84d67e49a9472033759c20c929b93930f96ac4ef6aa29d38eae1b9f0d117b5fb45cc1f6df83e994037b224fa155ebf25780d112eb1cac4e56d801dd075d647cdfc1d1905391d5c49dafe7db85f49a492641818bec36d30c60ca72e2bcdc0881", 0x0}, 0x40) 06:56:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8, &(0x7f0000000280)) 06:56:30 executing program 2: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="056304400000000000634040"], 0x0, 0x0, 0x0}) [ 2432.985108][T27257] debugfs: File '27250' in directory 'proc' already present! 06:56:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:30 executing program 2: syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000080)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="056304400000000000634040"], 0x0, 0x0, 0x0}) 06:56:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ftruncate(0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:56:30 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/56, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) [ 2433.377403][T27272] debugfs: File '27270' in directory 'proc' already present! [ 2435.019603][ C1] net_ratelimit: 22 callbacks suppressed [ 2435.019617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2435.031099][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2435.579663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2435.585472][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2436.139621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2436.145425][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2436.379610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2436.385434][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2436.539638][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2436.545446][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:56:35 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719dfb87c553a688f9da801891bb3e336624a0a51c1169ab50284810381fdf180daa75aadc0004ffc6e1d9c45bb262480ae58ab2dda9bc528582294f139f5e1", @ANYBLOB="0cda366f0001aeac44b8055fadbfac2a7dfe5d4965c1dcbe2544be6077bf0925f49126b4bd2dcbf0c45ceecc872b56070000000000000036bc9e", @ANYBLOB="8a7cfcb0bd543a07372504167b455ddfd0640764ef04ff46cf47e8137f38a3729f9fbaa545c0c343d9b3bec2feff1f63caf2"], 0x0, 0x102}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:56:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00@z\x18Sb\xb0\xee\xb0< f\xb7\xc3\xfd0U\xedWM\xff\x7f\x88\xa2\xf4V~\x81U\xea\xfb\xcf\xef\xb3\xf8\xf2\xb5\x98\xe5\x93~z\xa3\x17\xb2\xb0#]Z\xe4$\x8b\xcb\xc5F\x92\x11\xf0\x1e-\x80\xb0\xef\x84\xe3[\x05\xb5\xb9\x9c\xa7@\x91\xbbq0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000440)='cpuset.cpus\x00\xaa\xef+e\xcb\x98\xe6xm\xbe\xf2F\x96%\x12G\xc8X`\xed\xbe\xce\xdea', 0x2, 0x0) sendfile(r6, r4, 0x0, 0x100000010a000201) 06:56:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000002c0)={[], 0x0, 0x0, 0x0, 0x0, 0x135}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000280)) ptrace$cont(0x1f, r0, 0x0, 0x0) 06:56:35 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:35 executing program 5: keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="6e65912064656661756c74"], 0x1, 0xfffffffffffffffd) clone(0xffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000480)=""/153, &(0x7f0000000340)=0x99) gettid() 06:56:35 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00@z\x18Sb\xb0\xee\xb0< f\xb7\xc3\xfd0U\xedWM\xff\x7f\x88\xa2\xf4V~\x81U\xea\xfb\xcf\xef\xb3\xf8\xf2\xb5\x98\xe5\x93~z\xa3\x17\xb2\xb0#]Z\xe4$\x8b\xcb\xc5F\x92\x11\xf0\x1e-\x80\xb0\xef\x84\xe3[\x05\xb5\xb9\x9c\xa7@\x91\xbbq0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000440)='cpuset.cpus\x00\xaa\xef+e\xcb\x98\xe6xm\xbe\xf2F\x96%\x12G\xc8X`\xed\xbe\xce\xdea', 0x2, 0x0) sendfile(r6, r4, 0x0, 0x100000010a000201) 06:56:35 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) [ 2438.531574][T27319] encrypted_key: master key parameter is missing 06:56:35 executing program 5: shmat(0x0, &(0x7f0000fee000/0x1000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r5 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x70, 0x7f, 0x4, 0x80, 0x0, 0x0, 0xe719, 0x80020, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x800, 0x0, 0x0, 0xb, 0x73, 0x987, 0x2}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0xb510c9d5aff4bed, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x810, 0x3ff, 0x1, 0x0, 0x3f, 0x5}, r5, 0x9, r6, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0), 0x4) [ 2440.299640][ C0] net_ratelimit: 18 callbacks suppressed [ 2440.299665][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.311082][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2440.539599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.545417][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2440.699649][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2440.705447][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2441.019627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2441.025431][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2441.259618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2441.265406][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:56:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/60, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x16c, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x5, 0x2, "a77760f5a7645bc43c241d69912dda0c63c2a66726f8cfafd6c8fe2c98de7ba44947a79015f0fe57917cb62a93987a938fdedfce7bbb24fec2fba09c41fb233245f2604b9e07b8ab79ec15ef2818a179"}, 0xd8) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x3) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x3e8}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) r2 = socket(0x40000000015, 0x5, 0x0) getsockname$inet6(r2, 0x0, &(0x7f0000000080)) 06:56:41 executing program 3: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:41 executing program 0: shmat(0x0, &(0x7f0000fee000/0x1000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r5 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x70, 0x7f, 0x4, 0x80, 0x0, 0x0, 0xe719, 0x80020, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x800, 0x0, 0x0, 0xb, 0x73, 0x987, 0x2}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0xb510c9d5aff4bed, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x810, 0x3ff, 0x1, 0x0, 0x3f, 0x5}, r5, 0x9, r6, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0), 0x4) 06:56:41 executing program 5: shmat(0x0, &(0x7f0000fee000/0x1000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r5 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x70, 0x7f, 0x4, 0x80, 0x0, 0x0, 0xe719, 0x80020, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x800, 0x0, 0x0, 0xb, 0x73, 0x987, 0x2}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0xb510c9d5aff4bed, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x810, 0x3ff, 0x1, 0x0, 0x3f, 0x5}, r5, 0x9, r6, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0), 0x4) 06:56:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0800b5055e0bcfe87b0071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r1, 0x6, 0x10, &(0x7f0000bfcffc), &(0x7f0000000100)=0xfffffffffffffd3c) 06:56:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:42 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:42 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000c80)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x4ffe0) 06:56:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:42 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/62, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:42 executing program 2: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000040)='@ppp1wlan0GPL\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x870xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(r0, &(0x7f0000000000)=""/17, 0xfffffcd6) [ 2445.419577][ C1] net_ratelimit: 22 callbacks suppressed [ 2445.419591][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2445.431063][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2445.979628][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2445.985484][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2446.539638][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2446.545405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2446.779709][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2446.785481][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2446.939597][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2446.945366][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2450.699687][ C0] net_ratelimit: 18 callbacks suppressed [ 2450.705412][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2450.711184][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2450.939586][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2450.945363][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2451.099614][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2451.105445][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2451.419662][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2451.425427][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2451.659567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2451.665343][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:56:51 executing program 0: shmat(0x0, &(0x7f0000fee000/0x1000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r5 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x70, 0x7f, 0x4, 0x80, 0x0, 0x0, 0xe719, 0x80020, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x800, 0x0, 0x0, 0xb, 0x73, 0x987, 0x2}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0xb510c9d5aff4bed, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x810, 0x3ff, 0x1, 0x0, 0x3f, 0x5}, r5, 0x9, r6, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0), 0x4) 06:56:51 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:51 executing program 5: shmat(0x0, &(0x7f0000fee000/0x1000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r5 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x70, 0x7f, 0x4, 0x80, 0x0, 0x0, 0xe719, 0x80020, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x800, 0x0, 0x0, 0xb, 0x73, 0x987, 0x2}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0xb510c9d5aff4bed, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x810, 0x3ff, 0x1, 0x0, 0x3f, 0x5}, r5, 0x9, r6, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0), 0x4) 06:56:51 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x8000a0}]}) 06:56:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) [ 2453.901293][ T26] audit: type=1326 audit(1572764211.146:94): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27412 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x800000 06:56:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:51 executing program 3: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="f8000000160001000000000000000000e0000002000000000000000000000000ac1414bb00"/63, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fe880002000000000000000000000001000000006c0000007f000001000000000000000000000000000000000000000000000000000000000000403b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/176], 0x4}, 0x8}, 0x0) 06:56:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040), 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:51 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000440)='tmpfs\x00', 0x0, &(0x7f0000000140)='\x1a\xa86\x82\x9b\xf8]\xc5\x06c\x9a\x110\xb0\xf0V!\xad?\x9ate\xe9\xe0\x7f^\x03c\xd8\x00\t\xe9\xe0\xea\fY6\n\xda\xfe\x86l\xcc\x8c5|61\x15\x9d:)O{\xbf\xea\xe1\xc68*$?\xb5}9\x02\xf3E\xb8)bX\x88c\xe5:TE\x9b\xfe\xb7\x00\x00\x00\x00\x00\x00\x00\x00\x82\x00\x00\x00\x00\x00l\x00W\xe6XT\\l\xd6J\xf2\x12\xc4\x9e\xd4\xbe8<\x91^dKl0\xa17\x8bj~\xc3R\xa0\xd3\\=\x02\xbePY%\xb3\x1b,g\x8d\xfa\x9e\f&\xc4\xc0\x81\x9a\x91\x9e\xe3\xe6\xa6\xd8\xb80\xe4N\x00=\x10\x8d\xcc\xcbU\x1dg\xd9\xc5\x92\x94\x95\x10\xe3\xe8\xa8\xbfW\x00\x16\x90o=\x80`\xe2\xd1\xb2\xac\x92\x95F\xc0\xb5,\a\x00\x00\x00\xe7\xd6A\x8bb\xd7\f\x9e\xa4\xa2_h\xcc\xe0\nXpo\x9f=\xa4\xff\xaf\xb4\x02P\xaa\r46X\x8b\xfb\xc7/\x8b\xa5\x06\x11\xc9\x0fl \x00\x00\x00\x00') [ 2454.666165][T27449] tmpfs: Unknown parameter '¨6‚›ø]Åcš0°ðV!­?šteéà^cØ' [ 2454.683649][ T26] audit: type=1326 audit(1572764211.926:95): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27412 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x800000 [ 2455.819625][ C1] net_ratelimit: 22 callbacks suppressed [ 2455.819647][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2455.831079][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2456.379626][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2456.385387][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2456.939632][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2456.945401][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2457.179613][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2457.185377][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2457.339629][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2457.345411][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:56:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) r1 = socket$inet6(0xa, 0x3, 0xfc) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in6, @in6=@rand_addr="51014cb002399a6a9c3f35a61ebbcdf2", 0x4e21, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@local, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @local, 0x5}, 0x1c) 06:56:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040), 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:57 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:57 executing program 1: r0 = socket(0x1e, 0x805, 0x0) listen(r0, 0x0) 06:56:57 executing program 5: shmat(0x0, &(0x7f0000fee000/0x1000)=nil, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r4, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) r5 = getpid() splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) splice(r6, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000003c0)={0x5, 0x70, 0x7f, 0x4, 0x80, 0x0, 0x0, 0xe719, 0x80020, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x2}, 0x800, 0x0, 0x0, 0xb, 0x73, 0x987, 0x2}, r6, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000340)={0xb510c9d5aff4bed, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0xa8008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x810, 0x3ff, 0x1, 0x0, 0x3f, 0x5}, r5, 0x9, r6, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f00000000c0), 0x4) 06:56:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x9000000}]}) [ 2460.482912][ T26] audit: type=1326 audit(1572764217.726:96): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27465 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x9000000 06:56:57 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f0000000440)=ANY=[@ANYRES64], 0x8) preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000340)=""/180, 0xb4}], 0x1, 0x4) 06:56:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040), 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:56:58 executing program 1: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f0000000340)='/selinux/poli\xec\x13\rA\x9e\xd7j\x8e\xcbo\xccb\xf0@^\x86t$\x87\x10]\xf3\x9d\x81\xda\x03R\x9b{\xf4\t\xaa\x83\xfa/\xfb{\xc5{\x01~\xe0,hhw\xdd\xd0\x83\xc7\x13\xb9\xf3G\x00'/80) r0 = gettid() tkill(r0, 0x3c) socket$inet6(0xa, 0x2, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) 06:56:58 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:56:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) [ 2461.109595][ C0] net_ratelimit: 18 callbacks suppressed [ 2461.109610][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2461.121092][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2461.247343][T27504] devpts: called with bogus options [ 2461.255161][ T26] audit: type=1326 audit(1572764218.496:97): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=27465 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd8a code=0x9000000 [ 2461.260979][T27507] devpts: called with bogus options 06:56:58 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x0, 0x4}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 2461.339590][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2461.345366][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2461.499615][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2461.505405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2461.819646][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2461.825392][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2462.059617][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2462.065406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2466.229588][ C1] net_ratelimit: 22 callbacks suppressed [ 2466.229598][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2466.241027][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2466.779607][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2466.785442][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:57:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff81, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 06:57:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:57:04 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$nl_crypto(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=@get={0xe0, 0x13, 0x1, 0x0, 0x0, {{'cbc(aes)\x02\x00\x00\x00\x00\x00\x00@\x03\x00'}, [], [], 0x0, 0x2}}, 0xe0}}, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x68, 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x4000) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e20, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x6}, {0xa, 0x4e23, 0xff, @dev={0xfe, 0x80, [], 0x2a}, 0x4}, 0x9998, [0x6, 0xbc9d, 0x6, 0xd658, 0x5, 0x6, 0x2, 0x10000]}, 0x5c) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@dev}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000040)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xffff, &(0x7f0000000140)) 06:57:04 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00@z\x18Sb\xb0\xee\xb0< f\xb7\xc3\xfd0U\xedWM\xff\x7f\x88\xa2\xf4V~\x81U\xea\xfb\xcf\xef\xb3\xf8\xf2\xb5\x98\xe5\x93~z\xa3\x17\xb2\xb0#]Z\xe4$\x8b\xcb\xc5F\x92\x11\xf0\x1e-\x80\xb0\xef\x84\xe3[\x05\xb5\xb9\x9c\xa7@\x91\xbbq0x0}) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x1) 06:57:04 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:04 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:57:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x9) recvmmsg(r0, &(0x7f0000002b40)=[{{0x0, 0x40000, 0x0}}], 0x4000000000003be, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) [ 2467.339593][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2467.345392][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:57:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) [ 2467.620016][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2467.626330][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:57:05 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) [ 2467.739634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2467.745479][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2471.499573][ C0] net_ratelimit: 18 callbacks suppressed [ 2471.499583][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2471.511071][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2471.739611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2471.745383][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2471.899616][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2471.905376][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2472.219595][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2472.225345][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2472.459601][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2472.465364][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2475.261862][T27638] netlink: 'syz-executor.0': attribute type 16 has an invalid length. [ 2475.294696][T27638] bridge0: port 1(bridge_slave_0) entered disabled state [ 2475.304373][T27638] bridge0: port 2(bridge_slave_1) entered disabled state 06:57:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff81, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x10, 0x5}]}, 0x30}}, 0x0) 06:57:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:57:13 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ftruncate(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:57:13 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:57:13 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) [ 2476.619584][ C1] net_ratelimit: 22 callbacks suppressed [ 2476.619619][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2476.631103][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:57:13 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:57:14 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:14 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000040)="baa000ec3e3e3e0f2b75ee65f30f008f6300a6aff4660f3a62227d0f20e06635000040000f22e0260f0350000f01cf", 0x2f}], 0x1, 0x0, 0x0, 0x238) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ftruncate(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000001c0)={[0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x4c8, 0x0, 0x0, 0x0, 0x0, 0x4]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 06:57:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:57:14 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x100000400000003a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x3}, 0x1c) sendmmsg(r0, &(0x7f0000000300)=[{{0x0, 0xfffffffffffffdfa, &(0x7f0000000080)=[{&(0x7f0000000140)="8200", 0x3bd}], 0x1}}], 0x1, 0x8000) write(r0, &(0x7f00000000c0)='\x00\x00', 0x2) [ 2477.739642][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2477.745407][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2477.979580][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2477.985404][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.139584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.145349][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2478.459623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2478.465408][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2481.899669][ C0] net_ratelimit: 12 callbacks suppressed [ 2481.905404][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2481.911176][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2482.139604][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2482.145356][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2482.299631][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2482.305432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2482.619642][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2482.627151][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2482.859558][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2482.865351][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2484.781042][T27697] netlink: 'syz-executor.0': attribute type 16 has an invalid length. 06:57:22 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) recvmmsg(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x40, 0x4) r1 = socket(0x200000000000011, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) bind$packet(r1, &(0x7f0000000040), 0x14) sendmmsg(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x4e24, 0xe96f, @rand_addr="a2a178eac6ec1d93b3270e49f021b906", 0x6bc167a2}}}, 0x88) 06:57:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:57:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x15}) 06:57:22 executing program 2: socketpair$unix(0x1, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001fee, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() exit_group(0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0xa, 0xea03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 06:57:22 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) bind$packet(r0, &(0x7f0000000640)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @link_local}, 0x14) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:57:22 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000140)=""/246) creat(&(0x7f0000000080)='./file1\x00', 0x0) r1 = memfd_create(&(0x7f00000001c0)='\xb3', 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000080)=ANY=[], 0x29) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r1, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 06:57:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) write(r0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 06:57:22 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x20, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)) 06:57:22 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:57:22 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) [ 2487.019602][ C1] net_ratelimit: 18 callbacks suppressed [ 2487.025362][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2487.031161][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2488.139608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2488.145380][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2488.379621][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2488.385408][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2488.539623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2488.545392][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2488.859631][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2488.865444][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2492.299634][ C0] net_ratelimit: 12 callbacks suppressed [ 2492.299643][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2492.311106][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2492.539597][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2492.545343][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2492.699570][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2492.705342][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2493.019599][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2493.025354][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2493.259594][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2493.265405][ C1] protocol 88fb is buggy, dev hsr_slave_1 06:57:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) 06:57:31 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x20141042, 0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:hugetlbfs_t:s0\x00', 0x5571) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 06:57:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) 06:57:31 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="f7ca1bf892a0a3c7a4b78ef5e5cf04270f05cabf11cdbf5f02e6167ffb5acca376549d8c3b5474e7d63b75b7d85c4ce3a28e6b8897cd3e79ac76bccfc91e8705e1fe2a0a0e05f470ca9c279cfc9927acc7e5e945462f7719dfb87c553a688f9da801891bb3e336624a0a51c1169ab50284810381fdf180daa75aadc0004ffc6e1d9c45bb262480ae58ab2dda9b"], 0x0, 0x8d}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:57:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x8000000002046, 0x0) r1 = dup2(r0, r0) write$P9_RMKNOD(r1, &(0x7f0000000000)={0xff06}, 0xffffff57) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x15}) 06:57:31 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) setsockopt$packet_int(r1, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x26d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r3, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6, 0x0, 0x0, 0x3}, 0x1c) getsockname(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000100)=0x80) fcntl$setpipe(r4, 0x407, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000002c0)={0x1, 0x4, 0x10000}, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00'}) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x402c5828, 0x0) socket(0x10, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000300)="0503000006023e0001a00000c52cf7c25975e697b02f08006b2b2ff0dac8897c6b11876d886b143a301817ccd51cc5471d130a6632a88161b6fd8f24286a57c3fe257c3314a3974bb654697f", 0xfdfa, 0x0, 0x0, 0x582c) 06:57:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="280000002000290f00000000000000000200000000000000000000000400000008000100ac1414bb3743c8ce3416c81b7f83bb9d104eae802a9590c30f2a0ecfea5da9c15f84914f49b8f06cb9d13e706908881dfc69573cac62a3bbaaa9f0bc0124e9b06981359d66"], 0x28}}, 0x0) [ 2494.336324][T27764] ptrace attach of "/root/syz-executor.2"[27762] was attempted by "/root/syz-executor.2"[27764] [ 2494.402849][ T24] ================================================================== [ 2494.410962][ T24] BUG: KCSAN: data-race in __process_echoes / n_tty_receive_char_special [ 2494.419354][ T24] [ 2494.421681][ T24] write to 0xffffc900016329da of 1 bytes by task 27768 on cpu 1: [ 2494.429393][ T24] n_tty_receive_char_special+0x1295/0x1c10 [ 2494.435282][ T24] n_tty_receive_buf_common+0x1844/0x1b00 [ 2494.440994][ T24] n_tty_receive_buf+0x3a/0x50 [ 2494.445745][ T24] tty_ioctl+0xb75/0xe10 [ 2494.449977][ T24] do_vfs_ioctl+0x991/0xc60 [ 2494.454472][ T24] ksys_ioctl+0xbd/0xe0 [ 2494.458620][ T24] __x64_sys_ioctl+0x4c/0x60 [ 2494.463199][ T24] do_syscall_64+0xcc/0x370 [ 2494.467691][ T24] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 2494.473562][ T24] [ 2494.475885][ T24] read to 0xffffc900016329da of 1 bytes by task 24 on cpu 0: [ 2494.483254][ T24] __process_echoes+0x5aa/0x690 [ 2494.488365][ T24] commit_echoes+0x111/0x170 [ 2494.492948][ T24] n_tty_receive_buf_common+0x1741/0x1b00 [ 2494.498661][ T24] n_tty_receive_buf2+0x3d/0x60 [ 2494.503506][ T24] tty_ldisc_receive_buf+0x71/0xf0 [ 2494.508616][ T24] tty_port_default_receive_buf+0x87/0xd0 [ 2494.514331][ T24] flush_to_ldisc+0x1d5/0x260 [ 2494.519007][ T24] process_one_work+0x3d4/0x890 [ 2494.523854][ T24] worker_thread+0xa0/0x800 [ 2494.528349][ T24] kthread+0x1d4/0x200 [ 2494.532408][ T24] ret_from_fork+0x1f/0x30 [ 2494.536800][ T24] [ 2494.539114][ T24] Reported by Kernel Concurrency Sanitizer on: [ 2494.545258][ T24] CPU: 0 PID: 24 Comm: kworker/u4:2 Not tainted 5.4.0-rc3+ #0 06:57:31 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000100)={r1}) [ 2494.552692][ T24] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2494.562759][ T24] Workqueue: events_unbound flush_to_ldisc [ 2494.568645][ T24] ================================================================== [ 2494.576689][ T24] Kernel panic - not syncing: panic_on_warn set ... [ 2494.583267][ T24] CPU: 0 PID: 24 Comm: kworker/u4:2 Not tainted 5.4.0-rc3+ #0 [ 2494.590706][ T24] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2494.600763][ T24] Workqueue: events_unbound flush_to_ldisc [ 2494.606553][ T24] Call Trace: [ 2494.609845][ T24] dump_stack+0xf5/0x159 [ 2494.614084][ T24] panic+0x210/0x640 [ 2494.617974][ T24] ? worker_thread+0xa0/0x800 [ 2494.622647][ T24] ? vprintk_func+0x8d/0x140 [ 2494.627671][ T24] kcsan_report.cold+0xc/0x10 [ 2494.632354][ T24] __kcsan_setup_watchpoint+0x32e/0x4a0 [ 2494.637895][ T24] __tsan_read1+0x2c/0x30 [ 2494.642220][ T24] __process_echoes+0x5aa/0x690 [ 2494.647065][ T24] commit_echoes+0x111/0x170 [ 2494.651646][ T24] n_tty_receive_buf_common+0x1741/0x1b00 [ 2494.657369][ T24] n_tty_receive_buf2+0x3d/0x60 [ 2494.662210][ T24] ? n_tty_receive_buf_common+0x1b00/0x1b00 [ 2494.668096][ T24] tty_ldisc_receive_buf+0x71/0xf0 [ 2494.673207][ T24] tty_port_default_receive_buf+0x87/0xd0 [ 2494.678920][ T24] flush_to_ldisc+0x1d5/0x260 [ 2494.683601][ T24] process_one_work+0x3d4/0x890 [ 2494.688457][ T24] worker_thread+0xa0/0x800 [ 2494.692965][ T24] kthread+0x1d4/0x200 [ 2494.697027][ T24] ? rescuer_thread+0x6a0/0x6a0 06:57:31 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000040)='S', 0x1) ioctl$TCXONC(r1, 0x540a, 0x2) write(r1, 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x1) [ 2494.701870][ T24] ? kthread_stop+0x2d0/0x2d0 [ 2494.706541][ T24] ret_from_fork+0x1f/0x30 [ 2494.712204][ T24] Kernel Offset: disabled [ 2494.716519][ T24] Rebooting in 86400 seconds..