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", 0x2000, &(0x7f0000002900)={&(0x7f0000000080)={0x50, 0xffffffffffffffda, 0x101, {0x7, 0x22, 0x81, 0x3000010, 0xffff, 0xd, 0x6, 0x3d5}}, &(0x7f0000002380)={0x18, 0xfffffffffffffff5, 0x5}, &(0x7f0000000140)={0x18, 0xfffffffffffffff9, 0x0, {0x80000001}}, &(0x7f00000001c0)={0x18, 0x0, 0x2, {0x20}}, &(0x7f0000000200)={0x18, 0x0, 0xfffffffffffffffa, {0x1f}}, &(0x7f0000000240)={0x28, 0x0, 0x0, {{0x3, 0x6, 0x0, r0}}}, &(0x7f00000022c0)={0x60, 0xfffffffffffffffe, 0x400, {{0x4, 0x8, 0x9778, 0x7, 0x8000, 0x951, 0x200, 0x9}}}, &(0x7f0000002340)={0x18, 0x0, 0x2, {0x8b}}, &(0x7f0000002980)=ANY=[@ANYBLOB="1a000000000000000800000000000000fcffffff2f70746d78000571405b3614d910d022591ce78336580d40362669dc34449e26ee2472d67c1ff66e89545c1ca9ee2ea4c9e082c8673916b524a30570e1872fca83b37f4e4fca58089d95e96fc1962f833eccfb5b64fc32c38c205b333315ce92cd3cfc5e08db70421664904e684443d1389dd9"], &(0x7f00000023c0)={0x20, 0xffffffffffffffda, 0x3, {0x0, 0x5}}, &(0x7f0000002400)={0x78, 0x0, 0xaf3, {0x0, 0x6, 0x0, {0x0, 0x8000000000000000, 0x101, 0x7fff, 0xb63, 0x7, 0xff, 0x3ff, 0xffffffff, 0xa000, 0x10000, 0xffffffffffffffff, 0xffffffffffffffff, 0x40, 0x1}}}, &(0x7f0000002540)={0x90, 0x0, 0xffc00000, {0x0, 0x2, 0x7fffffff, 0x1, 0x4000000, 0x7, {0x2, 0x8, 0xe4a5, 0x400, 0x3, 0x1, 0x8, 0x4, 0x0, 0x8000, 0x1ff, r2, r3, 0x6, 0x4}}}, &(0x7f0000002600)=ANY=[@ANYBLOB="d0000000daffffff050000000000000001000000000000000004000000000000050000002000000026262d5c290000000400000000000000cd880000000000000a000000090000002f6465762f70746d7800000000000000010000000000000009000000000000000a000000060000002f6465762f70746d7800000000000000060000000000000009000000000000000a000000070000002f6465762f70746d7800000020000000010000000000000004000000000000000a000000ffffff7f2f6465762f70746d780000000056d800"], &(0x7f0000002740)=ANY=[@ANYBLOB="b000000000000000430000000000000002000000000000000200000000000000060000000000000000000000000000000500009b720000000000000000000000feffffffffff1c000400000000000000fffeffffffffffff0300000000000000ffff000000000000000100eef59f10d20054580000400000ffff0000", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="06000000fdffffff000000000200000000000000040000000000000003000000515dffff255e260000000000"], &(0x7f0000002800)={0xa0, 0x0, 0x8, {{0x0, 0x0, 0x6, 0x1, 0x8, 0x3, {0x4, 0x4, 0x6, 0x3f, 0x0, 0x3, 0x876, 0x0, 0x1f, 0x4000, 0x4, r8, r9, 0x7, 0x80000001}}, {0x0, 0xc}}}, &(0x7f00000028c0)={0x20, 0x0, 0x80, {0xfffffff8, 0x0, 0x1a15, 0x800}}}) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r10, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x7fff, 0x0, 0x0, "8000000000000000000000000000001600"}) r11 = syz_open_pts(r10, 0x210e42) read(r11, &(0x7f0000000000)=""/110, 0x6e) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TCSETSF(r11, 0x5425, 0x0) 23:54:14 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = socket$inet6_sctp(0xa, 0x0, 0x84) dup3(r0, r1, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r4 = syz_open_pts(r3, 0x800) ioctl$TCSETSF(r4, 0x541e, 0x0) 23:54:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x10840) ioctl$TCSETSF(r1, 0x5425, 0x0) 23:54:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xf}, 0x0) 23:54:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xff00000000000000, &(0x7f0000000100)={[{'!%@'}]}) 23:54:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000fdfdffff0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000d0010000000001000"}) 23:54:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x10}, 0x0) 23:54:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b30550fced03ac88dc8db5"], 0x8d) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) syz_open_pts(r2, 0x0) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) ioctl$TCSETSF(r1, 0x5425, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000000), 0x690, 0x100) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000040)) ioctl$TCSETSF2(r2, 0x402c542d, &(0x7f00000000c0)={0x0, 0xe24, 0x9, 0x80000, 0x6, "e4f77a53dbf86d7f5bd66140a1e8a3f5a82151", 0x80000001, 0x7fffffff}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b30550fced03ac885c8db5"], 0x8d) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000340)={0x3, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000140)={0x25, 0x0, 0x0, 0x0, 0xfd, "000000001000000000000010000000001000"}) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000040)) 23:54:14 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x400, 0x4, 0x4, 0x1, 0x0, "80fe1581b8529716b900000000000000408100"}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x800, 0x81, 0xfff, 0x8001, 0x1a, "7a84ae873a5ac74c"}) r2 = syz_open_pts(r1, 0x0) fcntl$getownex(r2, 0x10, &(0x7f00000000c0)) ioctl$TCSETSF(r2, 0x541e, 0x0) 23:54:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000e0010000000001000"}) 23:54:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100080ffffff0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x11}, 0x0) 23:54:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xff0f000000000000, &(0x7f0000000100)={[{'!%@'}]}) 23:54:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100081ffffff0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_aout(r1, 0xfffffffffffffffe, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d62a114a, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x3, 0x3, 0x401, 0x4, 0x16, "817c67464ead190fe8260f0a4e8614c277da17"}) write$binfmt_aout(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b31c50fced03ac08dc8db5"], 0x8d) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x7, 0x0, 0x0, 0x1ff, 0x6, "00000004100071c400000010000000001000"}) r4 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x204400, 0x0) r5 = syz_open_pts(r4, 0x301142) ioctl$TCSETSF(r5, 0x5425, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x80003, 0x0) fsconfig$FSCONFIG_SET_FD(r6, 0x5, &(0x7f00000000c0)='\x00', 0x0, r3) r7 = dup(r4) ioctl$TIOCSWINSZ(r7, 0x5414, &(0x7f0000000040)={0x9, 0x6, 0x30e, 0x7ff}) 23:54:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0xc, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b30550fced03ac88dc8db5"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) ioctl$KDADDIO(r2, 0x4b34, 0x20) ioctl$TCSETSF(r1, 0x541e, 0x0) 23:54:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000100010000000001000"}) 23:54:15 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x12}, 0x0) 23:54:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/asound/seq/clients\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x3) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r2 = socket$alg(0x26, 0x5, 0x0) dup(r2) r3 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r3, 0x541e, 0x0) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r4, 0x80089419, &(0x7f0000000000)) 23:54:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100082ffffff0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x10280, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000080)={0x0, 0x4, 0x104, 0xfffffff7, 0x4, "476bce30ada83e2809b84ab6c1898088e50c21"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0xd7, 0x0, 0x1, 0xfffffffc, 0x0, "8000000000000000000000000000001600"}) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5425, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@v1={0x2, "bcd4e4a4d5873c26e01e29c65b89f6ac1b5051"}, 0x14, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000180)={0x4, 0xfffeffff, 0x50000, 0x1ce, 0x6, "1a4bfeae4feb6c487eafe50dd127de641bd246"}) 23:54:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xffffff7f00000000, &(0x7f0000000100)={[{'!%@'}]}) 23:54:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000110010000000001000"}) 23:54:15 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x25}, 0x0) 23:54:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000200000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040), 0x22041, 0x0) syz_open_pts(r1, 0x260102) syz_open_pts(r0, 0x40) r2 = syz_open_pts(r0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x3, 0x0, 0x3, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b30550fced03ac88dc8db5"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) ioctl$TCSETSF(r2, 0x5425, 0x0) syz_open_pts(r2, 0x40080) 23:54:15 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x20}, 0x10) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x1000000}}, './file0\x00'}) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) ioctl$TCSETSF(r3, 0x541e, 0x0) 23:54:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000120010000000001000"}) 23:54:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xffffffff00000000, &(0x7f0000000100)={[{'!%@'}]}) 23:54:15 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x60}, 0x0) 23:54:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000300000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000180010000000001000"}) 23:54:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x17) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x0, 0x0, "800004000000000001000000010100161000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5425, 0x0) 23:54:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x808, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000000)=0x7fffffff) 23:54:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x83}, 0x0) 23:54:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xfffffffffffffffe, &(0x7f0000000100)={[{'!%@'}]}) 23:54:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b30550fced03ac88dc8db5"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0xff, 0x0, 0x0, "670000000000fbffffffe6ffff1c0a00"}) r3 = syz_open_pts(r0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3b30550fced03ac88dc8db5"], 0x8d) ioctl$TCSETA(r4, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETSF(r5, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) ioctl$TCXONC(r5, 0x540a, 0x0) ioctl$TCSETSF(r3, 0x541e, 0x0) 23:54:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x2e5}, 0x0) 23:54:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000250010000000001000"}) 23:54:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000400000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl(r1, 0x4, &(0x7f0000000040)="8d5635ccdc89bbebb5db5b6cb46d2d01b6bfdf401c40f65044688928875b2717e9b5a5d5abfb2646c5114c25c96e870adf48fa993446f76a391e17f644e254616a82a144e72c2fa8a2348e0dc2608a4536c46e8d9b0d06759dc6f1d41e676f6af0c1602385ae179d7eff9196d0813695228d3ee7525e121326fbd89e0bbb38db80bb5ccc508e2bc4a8f5872042cdfc138416b4381930b1063a16c558e6ae0fdd86f50e8dcf748b228269e4adc5fb1f1a603c553524a7c76881d7cf8b4b34d0f99f912ef53a3ea58f50ecc6877a") ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5425, 0x0) 23:54:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0xffffffffffffffff, &(0x7f0000000100)={[{'!%@'}]}) 23:54:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x300}, 0x0) 23:54:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000340)={0x0, 0x0, 0x1}) syz_open_pts(r0, 0x902) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f30100000000000000dc8db5"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000240)={0xfff9, 0xffff, 0x7ffd, 0x9ffa, 0x0, "0000000200"}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x7, 0x7, 0xef48, 0x2, 0xfffffffa}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={r2, 0x3}, 0x8) r3 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) r4 = syz_open_dev$sg(&(0x7f00000002c0), 0x6, 0x80002) sendfile(r4, r0, 0x0, 0x2) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f0000000300)) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000000)=0x3) r5 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r5, 0x541e, 0x0) 23:54:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000400010000000001000"}) 23:54:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCNXCL(r1, 0x540d) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x1ff) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x500000, 0xfffffffe, 0x7fffffff, 0x3ff, 0x7, "c70e44f2f825d3d9e7a014a2b40ce4b6084207"}) ioctl$TCSETSF(r1, 0x5425, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)={0xfff, 0x8805, 0x8, 0x85b, 0x11, "14d6d6f1bcbb73d765ffc0e3057a06d2c979fa"}) 23:54:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000500000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x500}, 0x0) 23:54:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'\n%@'}]}) 23:54:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) syz_open_pts(r4, 0x200) 23:54:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x19, 0x20, 0x69, &(0x7f00000002c0)="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"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="1ee3f3782deb88"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000040)={0x3, 0xf800, 0x0, 0xd870, 0x19, "fb2ebe488912392c"}) r3 = syz_open_dev$vcsa(&(0x7f0000000080), 0x6, 0x602000) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f00000000c0)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r4 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r4, 0x5425, 0x0) 23:54:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005540010000000001000"}) 23:54:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000600000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x600}, 0x0) [ 735.495982][ T3799] affs: Unrecognized mount option " [ 735.495982][ T3799] %@" or missing value [ 735.505338][ T3799] affs: Error parsing options 23:54:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000700000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000005c0010000000001000"}) 23:54:17 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/nfs_layout_flexfiles', 0x10200, 0x1c5) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000080)=0xffffffffffffffff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r2 = syz_open_pts(r1, 0x60000) ioctl$TCSETSF(r2, 0x5425, 0x0) syz_open_pts(r2, 0x8040) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @private=0xa010101}, 0x10) 23:54:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!\n@'}]}) 23:54:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x700}, 0x0) 23:54:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x900}, 0x0) 23:54:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000800000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 735.838897][ T3830] affs: Unrecognized mount option "! [ 735.838897][ T3830] @" or missing value [ 735.848195][ T3830] affs: Error parsing options 23:54:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) syz_open_pts(r4, 0x200) 23:54:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000007a0010000000001000"}) 23:54:17 executing program 5: r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) ioctl$SCSI_IOCTL_SYNC(r0, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0xffffffff, 0x80000001, 0x0, 0x0, "8000000000000000000000000000001600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5425, 0x0) 23:54:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\x02'}]}) 23:54:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xa00}, 0x0) 23:54:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000900000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 736.477682][ T3860] affs: Unrecognized mount option "!%" or missing value [ 736.484740][ T3860] affs: Error parsing options 23:54:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000ffffff800010000000001000"}) 23:54:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xb00}, 0x0) 23:54:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\t'}]}) 23:54:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000600000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000a00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xc00}, 0x0) [ 736.761534][ T3883] affs: Unrecognized mount option "!% " or missing value [ 736.768804][ T3883] affs: Error parsing options 23:54:18 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) syz_open_pts(r4, 0x200) 23:54:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000ffffff810010000000001000"}) 23:54:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000b00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\n'}]}) 23:54:18 executing program 5: syz_open_dev$audion(&(0x7f0000000000), 0x3f, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x67b) unshare(0x40000000) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x0, 0x0) creat(0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x13, 0x0, &(0x7f0000000340)) lseek(r0, 0x101, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x8, &(0x7f0000002380)=ANY=[@ANYBLOB="620af8ff0c250021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2a0800000000000000a2e2c49e8020a69644a2f57ba32e8cf1cc1a100a9af698393aa0f3edab0bb9881f9c24045699fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546020677b0c5077da80fb982c1eea484a415b76967f000000751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c2918451ebdcf4cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec28b48b45ef413f634eb763289d01aa27ae8b09e00e79ab20b0b8eedfb7a68af2ad0000000000000006f803c6468972089b302d7bf6023cdcedb5e0125ebbcebdde510cb2364141215106bf04f658333719acd97cfa107d40224edc5465a932b77e74e80220d42bc6099ad2300000080006ef6c1ff0600000000000000c63a949e8b7955394ffa82b8e942c89112f40cfd7c3a1d37a6ab87b15867926602d94591c926abfb076719237c8d0e60b0eea24492a660583eecdb039ed3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a99630200a04d5bb924cfe5f3185418d60532af9c4d2ec7c3272095e63c80aff9fa740b5b7632f32030910800000000000000a2a790d62c6faec2fed44da4928b3014ab2f70344e16cb9a6298060d6b2ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa47b7da9c77af4c0eb97fca585ec6bf58351d164beb61e8caab9c7076cb0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f75ce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4da39f6b5c0200000000000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46492ee4bb690cca3af87ef3d789437322d53ba585a4b2d02edc3e28dd271c896249ed85b980680b6c294c83200001005ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffff7f00000000e5df73be83bb7d5ad897ef3b7cda42013d53046da21b40216e14ba2d6af8656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b0ed317902f19e385be9e48dcbcf729433282830689da6b53b263339871429d120000003341bf4a00fcffffffffffffffe09fec2271fe01d89646efd1cf870c88d7bb2366fde4a59429738fcc917a57f94f6c453cea793cc5ee0c2a5ff870ce5dfd34cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b0800ee58969c41595229df17bcad70fb4021428ce970275d5bc8955778567bc79e13b78249788f11f761038b61d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b7eed82571b7f9e119f2c00000080000000002a06f56dd074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f62ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c366e3a06fb99e0aa7f23a054b0060477e005cbf6b1844ade2f4d92d6bd72ee2c9fdc75aaaf1efeb946afd73fbcec7f259c395a483b4ad05573af403269b4a39c947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acecc34f24c9ae153ec60ac0694da85bff9f5f4df9b3e90e5c708ce65cd6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7be088ad2777399f5874c553aeb52982b5baac70bc94776a8525b86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc0500000016c1f8010000006e22a2a998de44aeadea2a40da8daccf080842a48672173739f7213a74cb2003016f1514216bdf57d2a409000000000000376c85b3b8a8c9aa3d14f93100c2e0893862eef552fcde2981f48c482bde6e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191eab6687ae26e9e0cda2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a688109000000250df98674152f94e32409e2d466483c17a65fc85fa3bce109b60000000000000000009cee560cb4c23d3a8d6550058dfaf622502aae9482aaacd503d876327283dd39adea74d06fa13a2326671b728c022d39f1b7bf90b258daa4714f11b9349a1bfe16000000d8263c92777303c86ac875ad2339d9cf6fc96831485067f16a876db691e61bba99087bfc9455131cd79f63402d3b89c4140815713e900200000000000000000086867c01eaa5ee892c51d5705794db23c697bb7f477235952a4df51a1b610e5072ebcd9cfe6759bd99d5b3af171d8830b1fc9e4c7e3b914b2455fdc927a4c77c1390bdc862a34165d23b4d8da44917163630922c5f0661b9abdd00f796819a6de45fbc673a63a5714e2b8e8d41cfb091cf1ed294573187182ef521df682704d0fc3177bcf9ce28462176326a32a627aa8e887ab384d8ba731c0506cdde0a61f03d91f8b94df32af08c4a53448e5d390b1f23270c7fe30d30a732d2b928d44160548536bfb0288ba49fc020ea23db58025f25f58fc04b24ef372573687b6ff84ce1a94629141bbc73db6c9a2fadc4e67aa1e9b8f518fe680375217173973692aa45a7c2ee5e608f81eca2f483245b7a6f458c57d078d34ccf2cce89331708de0f27f372920758d25ddec3b76c834d51a241273fcd87bcdbdb80297d57bd9956ce4b39a6d5636bf5b8067cff8b3d58888a07267168f2233e8cb67219c4cdaa37628419b3c1ac78ba41e86d4131795d4480bbf6f608c1eae68d266d2243328f71fddd06c4460cf01f3223b3a35e1c0e91ebd01c036b7aed3d973f8cdaf71ed66aa3fbf465ca80e9a42d9e1c691ed460d9fff0332415b20dbf603edcc179edff40697505d81cefa29827f1a88538d2651defda85297edee5de935f35751e5b1533d488d0b02c17565b8a7fe1ff0ecf67f02ad339359d949a1ccde085620bc617cb7c120cccb3569961c903df4a89696c2bef90384f5d02bacd97c9b7da34c20f5f612941602128bad282cb7e310f01a76c111e141686d3686a1da4101c3c155564e189cb1ae139b1cd5b8c00000000000000000000791f8ac27ee29dd774d64e5b9c316a9f615dba6db49c0bfdf41d526a3a74298861cf74021e7e89289dbb095c16ee9e03395b01b1fc3ac1e8509fc3f82fa67e4c4c768b796d3438c87d0458fb2af6815f0d2a4dcbc49482c110bf88ebdc8b83ca1c0010000079297b23542fe35192e2419897c2b5ea2890cfb6afce5c73f0b47eddee0caace9b88123b10a32c1928e7c7432bd87162755a2de40bca6aefb56470faa9b98ed1d8a672de17d8fd7f4e6baf5ee23ce326bbd3b352756d2623ab1d36d5a74c1ecbda6731a7fdda95f754f02e03c2e0edd37bb4c538a68f9ac974dfe8c6d67ab6e5be5bd9b69fc72c552de9cbd9f3664b38202a98e6e5bdfc1329659a30410197e7173ba6ca21054c540e82766983c089c3abf18a3e65f5b82d4336708bfe695e9e6563c793d71e8f08fa00fe294bc874d6283591a77bb98af3a00000009a3d686a2437f996a5a1fe4d734e913bbd469f12c135d6391e49e5756c83ed438893ede4a025f733de223794a81ad2ac97e4f642aa1d18a78cc80de9b2138265a114414c0000000000000000000000000000000000000000000000000048087277f06c3189bdf45b7138f868e2d4b2603b68f8298d33abb6454866f7ce95ebf6416f9054e51e212cd591655ca13543d89bda1f97bb832f1367c1c80930a83bef18f54158d6ca67bddfd4e1029749a1b9c6001b30adcd75c7589cf88b0cb7d2ccac246fe2042b2f05eb90ca160dfad8b212ab921d0e85fcb2d85ed0340e543de90074e7241033273ae9c0eb42e34a8d91dc50033dedc0ee702bc85d3474965996f4a492f1ca4d5bb34ad7cd78b2b5aff579cd2c44ab63e8168b11d2ee95b81f2c83e4bbb9bb67c2bfbc9a4ed3fd79b3113d102d310fb273e7cb1f07c7853fbaa4be5923ea0c1ac4ae3b8e57bd9c3c156b9db46d8732045ede718492f114a340b6f02d90bc1fa8b49690326c20fbffec26d7f606477e1e4a6eefcf1bef4eb1341169ccf90ef4cbdf07d9768201233f86cccbd2c0fb0ab5a5af731a12f9b0bf33ed2530984c14c1ed9f6c45e625c7722f60f7b69164761542925192ebf02b5b64cc6a9ae34a04d60e2fb66e54d330efe0465172f4eb25284be14cd7483d1eba383a8f7fb11c2fc0fe68846b0f83d9fc01c75c71c65c5464b2778ed6e1bf9e7bcdab1cd94dd6fd0c2fbffc76b9f35059655d0416b2e06ac7aa07b27f28cba75568e17c291d8b809bcc52f7be12b1566cd89dad6a7a54db95b5b097753c3f00c5aa9f6c41000000000000000000000000659f32a02ff1d7da6f6565154f6da2620fbe2432a618475a5b6e49e1725519b0157eeafb1ab84850f801c4f1ad7117c0135466300247b7aca0e1d993846d2fad81dca51af66faf1a41c698842b103455fd41b1b9b032c5258e855c87e49ba19c53609009d4f444db1ef5f5cc993faa928d11c3f47fdae4b17259d3f345ac08d1242100000000000000b25a447c711ab49376bd35b00c7cf6add5e2d29c4d5fe70327263b8bd29a63e3f044dbcdaef5e07d6404ab51ccb40f6a5c006c493fa01c77683c1475b3e68f8f78c9baeb778af2be7170ad2c080779188a5de42d51a1a8645e03f41a98115727e667b9c86170deb65c38cf050c03b5ce3dcdfc261fb8500ee4833d2626a1521128f73799b832de8caa6913dcd278086410e40cffc333c70abeb88f586e207787a3448cbab6d011a6ff2b379cf04464ae"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe2c, 0x10, &(0x7f0000000000), 0x32}, 0x48) r1 = semget$private(0x0, 0x20000000102, 0x0) semop(r1, &(0x7f0000000300)=[{0x0, 0xff0b}], 0x1) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 23:54:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xd00}, 0x0) [ 737.446221][ T3914] affs: Unrecognized mount option "!% [ 737.446221][ T3914] " or missing value [ 737.455571][ T3914] affs: Error parsing options 23:54:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xe00}, 0x0) 23:54:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000c00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000ffffff820010000000001000"}) 23:54:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\x15'}]}) 23:54:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xf00}, 0x0) 23:54:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000edf0010000000001000"}) [ 738.170346][ T3959] affs: Unrecognized mount option "!%" or missing value [ 738.178006][ T3959] affs: Error parsing options 23:54:19 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000d00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x1100}, 0x0) 23:54:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x80, 0x6, 0x8, 0x1, 0x15, "394c1ca553b2975bb090d30e245921397fa581"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)={0x2000000, 0xfffffffc, 0x4, 0x0, 0xf2, "800000001df41500"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x1) ioctl$TCSETSF(r1, 0x5425, 0x0) 23:54:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%%'}]}) 23:54:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000fffffdfd0010000000001000"}) 23:54:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x1200}, 0x0) 23:54:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000000a00000000000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000e00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 738.579822][ T3985] affs: Unrecognized mount option "!%%" or missing value [ 738.586891][ T3985] affs: Error parsing options 23:54:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%6'}]}) 23:54:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000ff0010000000001000"}) 23:54:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x2500}, 0x0) [ 739.031326][ T4005] affs: Unrecognized mount option "!%6" or missing value [ 739.038984][ T4005] affs: Error parsing options 23:54:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:20 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) (fail_nth: 1) 23:54:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x4788}, 0x0) 23:54:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001000000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000fdfdffff0010000000001000"}) 23:54:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%^'}]}) [ 739.454110][ T4031] affs: Unrecognized mount option "!%^" or missing value [ 739.461272][ T4031] affs: Error parsing options [ 739.539205][ T4030] FAULT_INJECTION: forcing a failure. [ 739.539205][ T4030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 739.553279][ T4030] CPU: 0 PID: 4030 Comm: syz-executor.5 Not tainted 5.15.0-syzkaller #0 [ 739.561632][ T4030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 739.571711][ T4030] Call Trace: [ 739.575000][ T4030] [ 739.577942][ T4030] dump_stack_lvl+0x201/0x2d8 [ 739.582622][ T4030] ? show_regs_print_info+0x12/0x12 [ 739.587828][ T4030] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 739.593538][ T4030] ? __might_fault+0xb6/0x110 [ 739.598213][ T4030] should_fail+0x384/0x4b0 [ 739.602620][ T4030] _copy_from_user+0x2d/0x170 [ 739.607288][ T4030] sendmsg_copy_msghdr+0xbb/0x650 [ 739.612303][ T4030] ? __copy_msghdr_from_user+0x620/0x620 [ 739.617933][ T4030] __sys_sendmsg+0x250/0x370 [ 739.622517][ T4030] ? ____sys_sendmsg+0x910/0x910 [ 739.627473][ T4030] ? __context_tracking_exit+0x7a/0xd0 [ 739.632934][ T4030] ? lockdep_hardirqs_on_prepare+0x412/0x780 [ 739.638905][ T4030] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 739.644879][ T4030] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 739.650855][ T4030] ? lockdep_hardirqs_on+0x95/0x140 [ 739.656315][ T4030] ? syscall_enter_from_user_mode+0x52/0x1b0 [ 739.662296][ T4030] do_syscall_64+0x44/0xd0 [ 739.666702][ T4030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 739.672586][ T4030] RIP: 0033:0x7f078d426ae9 [ 739.676993][ T4030] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 739.696605][ T4030] RSP: 002b:00007f078a99c188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 739.705035][ T4030] RAX: ffffffffffffffda RBX: 00007f078d539f60 RCX: 00007f078d426ae9 [ 739.712996][ T4030] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000004 [ 739.720961][ T4030] RBP: 00007f078a99c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 739.728928][ T4030] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 739.736897][ T4030] R13: 00007ffed5c32f7f R14: 00007f078a99c300 R15: 0000000000022000 [ 739.744871][ T4030] 23:54:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100080ffffff0010000000001000"}) 23:54:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\x00'}]}) 23:54:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x4888}, 0x0) 23:54:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001100000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100081ffffff0010000000001000"}) 23:54:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x5865}, 0x0) [ 740.221706][ T4049] affs: Unrecognized mount option "!%" or missing value [ 740.229248][ T4049] affs: Error parsing options 23:54:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:21 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001200000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100082ffffff0010000000001000"}) 23:54:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\x00'}]}) 23:54:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x6000}, 0x0) 23:54:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001800000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 740.872294][ T4084] device bond0 entered promiscuous mode [ 740.878605][ T4084] device bond_slave_0 entered promiscuous mode [ 740.886897][ T4084] device bond_slave_1 entered promiscuous mode [ 740.905211][ T4084] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x6558}, 0x0) [ 740.936845][ T4085] affs: Unrecognized mount option "!%" or missing value [ 740.944519][ T4085] affs: Error parsing options 23:54:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000200000010000000001000"}) 23:54:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%\x00'}]}) 23:54:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000002500000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 741.137402][ T4084] device bond0 left promiscuous mode [ 741.143107][ T4084] device bond_slave_0 left promiscuous mode [ 741.155126][ T4084] device bond_slave_1 left promiscuous mode [ 741.217433][ T4107] affs: Unrecognized mount option "!%" or missing value [ 741.224421][ T4107] affs: Error parsing options 23:54:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000300000010000000001000"}) 23:54:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8100}, 0x0) 23:54:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000005c00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:54:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000400000010000000001000"}) 23:54:22 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 741.714669][ T4132] affs: Unrecognized mount option "!%@" or missing value [ 741.721953][ T4132] affs: Error parsing options 23:54:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8300}, 0x0) [ 741.881679][ T4133] device bond0 entered promiscuous mode [ 741.888239][ T4133] device bond_slave_0 entered promiscuous mode [ 741.899044][ T4133] device bond_slave_1 entered promiscuous mode [ 741.916721][ T4133] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000500000010000000001000"}) 23:54:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000007a00000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 741.988381][ T4133] device bond0 left promiscuous mode [ 741.993783][ T4133] device bond_slave_0 left promiscuous mode [ 742.007766][ T4133] device bond_slave_1 left promiscuous mode 23:54:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8847}, 0x0) 23:54:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x2}) 23:54:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000600000010000000001000"}) 23:54:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000003000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8848}, 0x0) [ 742.545271][ T4133] device bond0 entered promiscuous mode [ 742.551073][ T4133] device bond_slave_0 entered promiscuous mode [ 742.557841][ T4133] device bond_slave_1 entered promiscuous mode [ 742.564522][ T4133] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000700000010000000001000"}) [ 742.650629][ T4157] affs: Unrecognized mount option "!%@" or missing value [ 742.658472][ T4157] affs: Error parsing options [ 742.673754][ T4133] device bond0 left promiscuous mode [ 742.679397][ T4133] device bond_slave_0 left promiscuous mode [ 742.685436][ T4133] device bond_slave_1 left promiscuous mode 23:54:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x3}) 23:54:24 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xe502}, 0x0) 23:54:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000800000010000000001000"}) 23:54:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xfeff}, 0x0) [ 743.202866][ T4192] affs: Unrecognized mount option "!%@" or missing value [ 743.213521][ T4192] affs: Error parsing options 23:54:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000900000010000000001000"}) [ 743.398517][ T4206] device bond0 entered promiscuous mode [ 743.404690][ T4206] device bond_slave_0 entered promiscuous mode [ 743.414623][ T4206] device bond_slave_1 entered promiscuous mode [ 743.433303][ T4206] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x4}) [ 743.459154][ T4206] device bond0 left promiscuous mode [ 743.464694][ T4206] device bond_slave_0 left promiscuous mode [ 743.474163][ T4206] device bond_slave_1 left promiscuous mode 23:54:24 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000005405000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xff0f}, 0x0) [ 743.755626][ T4223] affs: Unrecognized mount option "!%@" or missing value [ 743.762878][ T4223] affs: Error parsing options 23:54:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000a00000010000000001000"}) 23:54:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xfffe}, 0x0) [ 743.987196][ T4206] device bond0 entered promiscuous mode [ 743.993082][ T4206] device bond_slave_0 entered promiscuous mode [ 743.999817][ T4206] device bond_slave_1 entered promiscuous mode [ 744.006592][ T4206] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 744.044909][ T4206] device bond0 left promiscuous mode [ 744.050841][ T4206] device bond_slave_0 left promiscuous mode [ 744.056958][ T4206] device bond_slave_1 left promiscuous mode 23:54:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x5}) 23:54:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000006000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000b00000010000000001000"}) 23:54:25 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x34000}, 0x0) 23:54:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x400300}, 0x0) [ 744.579481][ T4252] affs: Unrecognized mount option "!%@" or missing value [ 744.586807][ T4252] affs: Error parsing options 23:54:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000007000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:26 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000c00000010000000001000"}) [ 744.713503][ T4262] device bond0 entered promiscuous mode [ 744.719694][ T4262] device bond_slave_0 entered promiscuous mode [ 744.729370][ T4262] device bond_slave_1 entered promiscuous mode [ 744.750340][ T4262] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 744.795468][ T4262] device bond0 left promiscuous mode [ 744.801765][ T4262] device bond_slave_0 left promiscuous mode [ 744.819772][ T4262] device bond_slave_1 left promiscuous mode 23:54:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x1000000}, 0x0) 23:54:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x6}) 23:54:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000009000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000d00000010000000001000"}) [ 745.316562][ T4288] affs: Unrecognized mount option "!%@" or missing value [ 745.323908][ T4288] affs: Error parsing options 23:54:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x2000000}, 0x0) 23:54:26 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000a000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000e00000010000000001000"}) 23:54:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x7}) 23:54:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x3000000}, 0x0) [ 745.790428][ T4313] device bond0 entered promiscuous mode [ 745.796117][ T4313] device bond_slave_0 entered promiscuous mode [ 745.807409][ T4313] device bond_slave_1 entered promiscuous mode [ 745.833206][ T4313] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:27 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 745.878980][ T4318] affs: Unrecognized mount option "!%@" or missing value [ 745.890072][ T4318] affs: Error parsing options 23:54:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000b000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001000000010000000001000"}) 23:54:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x8}) [ 746.069992][ T4313] device bond0 left promiscuous mode [ 746.076267][ T4313] device bond_slave_0 left promiscuous mode [ 746.087409][ T4313] device bond_slave_1 left promiscuous mode 23:54:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x4000000}, 0x0) 23:54:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001100000010000000001000"}) 23:54:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000c000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 746.503415][ T4354] device bond0 entered promiscuous mode [ 746.509211][ T4354] device bond_slave_0 entered promiscuous mode [ 746.515488][ T4354] device bond_slave_1 entered promiscuous mode [ 746.522265][ T4354] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 746.534423][ T4342] affs: Unrecognized mount option "!%@" or missing value [ 746.543344][ T4342] affs: Error parsing options [ 746.637404][ T4354] device bond0 left promiscuous mode [ 746.642818][ T4354] device bond_slave_0 left promiscuous mode [ 746.648972][ T4354] device bond_slave_1 left promiscuous mode 23:54:28 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x5, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x5000000}, 0x0) 23:54:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001200000010000000001000"}) 23:54:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000d000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x9}) 23:54:28 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 746.943063][ T1197] ieee802154 phy0 wpan0: encryption failed: -22 [ 746.949550][ T1197] ieee802154 phy1 wpan1: encryption failed: -22 23:54:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x6000000}, 0x0) [ 747.031979][ T4378] device bond0 entered promiscuous mode [ 747.037665][ T4378] device bond_slave_0 entered promiscuous mode [ 747.043938][ T4378] device bond_slave_1 entered promiscuous mode [ 747.050720][ T4378] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000001800000010000000001000"}) 23:54:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000e000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 747.154944][ T4374] affs: Unrecognized mount option "!%@" or missing value [ 747.180208][ T4374] affs: Error parsing options 23:54:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000002500000010000000001000"}) 23:54:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xa}) [ 747.318334][ T4378] device bond0 left promiscuous mode [ 747.323818][ T4378] device bond_slave_0 left promiscuous mode [ 747.330117][ T4378] device bond_slave_1 left promiscuous mode 23:54:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x7000000}, 0x0) [ 747.447125][ T4408] affs: Unrecognized mount option "!%@" or missing value [ 747.454181][ T4408] affs: Error parsing options [ 747.517707][ T4378] device bond0 entered promiscuous mode [ 747.523306][ T4378] device bond_slave_0 entered promiscuous mode [ 747.529663][ T4378] device bond_slave_1 entered promiscuous mode [ 747.536424][ T4378] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 747.620475][ T4378] device bond0 left promiscuous mode [ 747.625840][ T4378] device bond_slave_0 left promiscuous mode [ 747.632137][ T4378] device bond_slave_1 left promiscuous mode 23:54:29 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000df0e000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000005c00000010000000001000"}) 23:54:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8000000}, 0x0) 23:54:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xb}) 23:54:29 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 747.948283][ T4434] affs: Unrecognized mount option "!%@" or missing value [ 747.955336][ T4434] affs: Error parsing options 23:54:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000011000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000007a00000010000000001000"}) 23:54:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x9000000}, 0x0) [ 748.105964][ T4435] device bond0 entered promiscuous mode [ 748.112039][ T4435] device bond_slave_0 entered promiscuous mode [ 748.121767][ T4435] device bond_slave_1 entered promiscuous mode [ 748.141386][ T4435] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 748.174999][ T4435] device bond0 left promiscuous mode [ 748.181226][ T4435] device bond_slave_0 left promiscuous mode [ 748.211919][ T4435] device bond_slave_1 left promiscuous mode 23:54:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xc}) 23:54:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000012000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000003000010000000001000"}) [ 748.676024][ T4461] affs: Unrecognized mount option "!%@" or missing value [ 748.683449][ T4461] affs: Error parsing options [ 748.775267][ T4472] device bond0 entered promiscuous mode [ 748.781088][ T4472] device bond_slave_0 entered promiscuous mode [ 748.787432][ T4472] device bond_slave_1 entered promiscuous mode [ 748.794055][ T4472] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 748.890911][ T4472] device bond0 left promiscuous mode [ 748.896530][ T4472] device bond_slave_0 left promiscuous mode [ 748.902559][ T4472] device bond_slave_1 left promiscuous mode 23:54:30 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xa000000}, 0x0) 23:54:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000018000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xd}) 23:54:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005000010000000001000"}) 23:54:30 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 749.437040][ T4494] affs: Unrecognized mount option "!%@" or missing value [ 749.445137][ T4494] affs: Error parsing options 23:54:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000005405000010000000001000"}) 23:54:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000025000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 749.497088][ T4499] device bond0 entered promiscuous mode [ 749.503349][ T4499] device bond_slave_0 entered promiscuous mode [ 749.514002][ T4499] device bond_slave_1 entered promiscuous mode [ 749.531516][ T4499] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xb000000}, 0x0) [ 749.623503][ T4499] device bond0 left promiscuous mode [ 749.636166][ T4499] device bond_slave_0 left promiscuous mode [ 749.645969][ T4499] device bond_slave_1 left promiscuous mode 23:54:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xe}) 23:54:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000006000010000000001000"}) 23:54:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xc000000}, 0x0) [ 749.992216][ T4525] affs: Unrecognized mount option "!%@" or missing value [ 749.999348][ T4525] affs: Error parsing options [ 750.058906][ T4499] device bond0 entered promiscuous mode [ 750.064489][ T4499] device bond_slave_0 entered promiscuous mode [ 750.070949][ T4499] device bond_slave_1 entered promiscuous mode [ 750.077675][ T4499] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 750.112127][ T4499] device bond0 left promiscuous mode [ 750.117589][ T4499] device bond_slave_0 left promiscuous mode [ 750.123610][ T4499] device bond_slave_1 left promiscuous mode 23:54:31 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000007000010000000001000"}) 23:54:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xd000000}, 0x0) 23:54:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000040000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x10}) 23:54:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000554000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000009000010000000001000"}) [ 750.636934][ T4555] affs: Unrecognized mount option "!%@" or missing value [ 750.660631][ T4555] affs: Error parsing options 23:54:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xe000000}, 0x0) [ 750.789302][ T4567] device bond0 entered promiscuous mode [ 750.795579][ T4567] device bond_slave_0 entered promiscuous mode [ 750.804427][ T4567] device bond_slave_1 entered promiscuous mode [ 750.822202][ T4567] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 750.845276][ T4567] device bond0 left promiscuous mode 23:54:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x11}) [ 750.864966][ T4567] device bond_slave_0 left promiscuous mode [ 750.876156][ T4567] device bond_slave_1 left promiscuous mode 23:54:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000005c000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000a000010000000001000"}) [ 751.238574][ T4586] affs: Unrecognized mount option "!%@" or missing value [ 751.246400][ T4586] affs: Error parsing options 23:54:32 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xf000000}, 0x0) 23:54:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) write$binfmt_aout(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r4 = syz_open_pts(r3, 0x0) ioctl$TCSETSF(r4, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000007a000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x12}) 23:54:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000b000010000000001000"}) [ 751.633338][ T4607] device bond0 entered promiscuous mode [ 751.633512][ T4617] affs: Unrecognized mount option "!%@" or missing value [ 751.633577][ T4617] affs: Error parsing options [ 751.652299][ T4607] device bond_slave_0 entered promiscuous mode [ 751.662907][ T4607] device bond_slave_1 entered promiscuous mode 23:54:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x10000000}, 0x0) 23:54:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000edf000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 751.682612][ T4607] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x18}) [ 751.746511][ T4607] device bond0 left promiscuous mode [ 751.752710][ T4607] device bond_slave_0 left promiscuous mode [ 751.760886][ T4607] device bond_slave_1 left promiscuous mode 23:54:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000c000010000000001000"}) [ 751.942919][ T4633] affs: Unrecognized mount option "!%@" or missing value [ 751.950333][ T4633] affs: Error parsing options 23:54:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x11000000}, 0x0) 23:54:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000d000010000000001000"}) [ 752.383207][ T4607] device bond0 entered promiscuous mode [ 752.389250][ T4607] device bond_slave_0 entered promiscuous mode [ 752.398556][ T4607] device bond_slave_1 entered promiscuous mode [ 752.417718][ T4607] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 752.440611][ T4607] device bond0 left promiscuous mode [ 752.446282][ T4607] device bond_slave_0 left promiscuous mode [ 752.452313][ T4607] device bond_slave_1 left promiscuous mode 23:54:33 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xa, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x21}) 23:54:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000ff000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x12000000}, 0x0) 23:54:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000e000010000000001000"}) [ 752.749570][ T4673] affs: Unrecognized mount option "!%@" or missing value [ 752.756757][ T4673] affs: Error parsing options 23:54:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x25000000}, 0x0) 23:54:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000df0e000010000000001000"}) 23:54:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000020010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x25}) [ 753.041695][ T4684] device bond0 entered promiscuous mode [ 753.048011][ T4684] device bond_slave_0 entered promiscuous mode [ 753.056046][ T4684] device bond_slave_1 entered promiscuous mode [ 753.074786][ T4684] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x60000000}, 0x0) [ 753.250592][ T4684] device bond0 left promiscuous mode [ 753.256662][ T4684] device bond_slave_0 left promiscuous mode [ 753.265753][ T4684] device bond_slave_1 left promiscuous mode 23:54:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000011000010000000001000"}) [ 753.291154][ T4697] affs: Unrecognized mount option "!%@" or missing value [ 753.298533][ T4697] affs: Error parsing options 23:54:35 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000110000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x65580000}, 0x0) 23:54:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x41}) 23:54:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000012000010000000001000"}) [ 753.802472][ T4729] affs: Unrecognized mount option "!%@" or missing value [ 753.810003][ T4729] affs: Error parsing options 23:54:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x48}) 23:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000210000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x81000000}, 0x0) 23:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000310000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 754.145096][ T4741] device bond0 entered promiscuous mode [ 754.151090][ T4741] device bond_slave_0 entered promiscuous mode [ 754.159948][ T4741] device bond_slave_1 entered promiscuous mode [ 754.179094][ T4741] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000018000010000000001000"}) [ 754.246665][ T4752] affs: Unrecognized mount option "!%@" or missing value [ 754.253729][ T4752] affs: Error parsing options [ 754.263125][ T4741] device bond0 left promiscuous mode [ 754.272532][ T4741] device bond_slave_0 left promiscuous mode [ 754.284085][ T4741] device bond_slave_1 left promiscuous mode 23:54:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x83000000}, 0x0) [ 754.720294][ T4741] device bond0 entered promiscuous mode [ 754.725981][ T4741] device bond_slave_0 entered promiscuous mode [ 754.732451][ T4741] device bond_slave_1 entered promiscuous mode [ 754.739623][ T4741] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 754.752055][ T4741] device bond0 left promiscuous mode [ 754.757535][ T4741] device bond_slave_0 left promiscuous mode [ 754.763643][ T4741] device bond_slave_1 left promiscuous mode 23:54:36 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x88470000}, 0x0) 23:54:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x4c}) 23:54:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000025000010000000001000"}) 23:54:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000410000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) read(r2, &(0x7f0000000100)=""/67, 0x43) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x88480000}, 0x0) 23:54:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000040000010000000001000"}) [ 754.998903][ T4791] affs: Unrecognized mount option "!%@" or missing value [ 755.006233][ T4791] affs: Error parsing options 23:54:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x5c}) 23:54:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 755.277199][ T4800] device bond0 entered promiscuous mode [ 755.283071][ T4800] device bond_slave_0 entered promiscuous mode [ 755.291553][ T4800] device bond_slave_1 entered promiscuous mode [ 755.313449][ T4800] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000554000010000000001000"}) [ 755.333728][ T4812] affs: Unrecognized mount option "!%@" or missing value [ 755.341050][ T4812] affs: Error parsing options [ 755.361463][ T4800] device bond0 left promiscuous mode [ 755.366923][ T4800] device bond_slave_0 left promiscuous mode [ 755.382123][ T4800] device bond_slave_1 left promiscuous mode 23:54:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000610000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 755.913720][ T4800] device bond0 entered promiscuous mode [ 755.919654][ T4800] device bond_slave_0 entered promiscuous mode [ 755.926040][ T4800] device bond_slave_1 entered promiscuous mode [ 755.932705][ T4800] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 755.957594][ T4800] device bond0 left promiscuous mode [ 755.962983][ T4800] device bond_slave_0 left promiscuous mode [ 755.969633][ T4800] device bond_slave_1 left promiscuous mode 23:54:37 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x60}) 23:54:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000005c000010000000001000"}) 23:54:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x88a8ffff}, 0x0) 23:54:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000710000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 756.228823][ T4853] affs: Unrecognized mount option "!%@" or missing value [ 756.236234][ T4853] affs: Error parsing options 23:54:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x68}) [ 756.459322][ T4865] device bond0 entered promiscuous mode [ 756.466087][ T4865] device bond_slave_0 entered promiscuous mode [ 756.475779][ T4865] device bond_slave_1 entered promiscuous mode [ 756.495755][ T4865] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000810000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x9effffff}, 0x0) 23:54:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000007a000010000000001000"}) 23:54:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TCSETSF(r3, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 756.612466][ T4865] device bond0 left promiscuous mode [ 756.619216][ T4865] device bond_slave_0 left promiscuous mode [ 756.634310][ T4865] device bond_slave_1 left promiscuous mode [ 756.642647][ T4878] affs: Unrecognized mount option "!%@" or missing value [ 756.649853][ T4878] affs: Error parsing options [ 757.185574][ T4865] device bond0 entered promiscuous mode [ 757.191366][ T4865] device bond_slave_0 entered promiscuous mode [ 757.198588][ T4865] device bond_slave_1 entered promiscuous mode [ 757.205226][ T4865] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 757.215119][ T4865] device bond0 left promiscuous mode [ 757.220704][ T4865] device bond_slave_0 left promiscuous mode [ 757.226782][ T4865] device bond_slave_1 left promiscuous mode 23:54:38 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xe5020000}, 0x0) 23:54:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x6c}) 23:54:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000910000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000edf000010000000001000"}) 23:54:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) syz_open_pts(r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 757.453127][ T4915] affs: Unrecognized mount option "!%@" or missing value [ 757.460372][ T4915] affs: Error parsing options 23:54:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000ff000010000000001000"}) 23:54:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xefffffff}, 0x0) 23:54:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000a10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:39 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x74}) [ 757.721142][ T4922] device bond0 entered promiscuous mode [ 757.727688][ T4922] device bond_slave_0 entered promiscuous mode [ 757.737072][ T4922] device bond_slave_1 entered promiscuous mode [ 757.754968][ T4922] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000b10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 757.905263][ T4922] device bond0 left promiscuous mode [ 757.912213][ T4922] device bond_slave_0 left promiscuous mode [ 757.930221][ T4922] device bond_slave_1 left promiscuous mode [ 758.235790][ T4943] affs: Unrecognized mount option "!%@" or missing value [ 758.242860][ T4943] affs: Error parsing options [ 758.373599][ T4922] device bond0 entered promiscuous mode [ 758.379503][ T4922] device bond_slave_0 entered promiscuous mode [ 758.385870][ T4922] device bond_slave_1 entered promiscuous mode [ 758.392488][ T4922] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 758.444482][ T4922] device bond0 left promiscuous mode [ 758.450029][ T4922] device bond_slave_0 left promiscuous mode [ 758.456351][ T4922] device bond_slave_1 left promiscuous mode 23:54:39 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xf, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:39 executing program 0: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:39 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000020010000000001000"}) 23:54:39 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff}, 0x0) 23:54:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000c10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0x7a}) [ 758.701942][ T4971] affs: Unrecognized mount option "!%@" or missing value [ 758.709124][ T4971] affs: Error parsing options 23:54:40 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xfeff0000}, 0x0) 23:54:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000d10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xce}) 23:54:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:40 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000110000000001000"}) [ 759.006566][ T4980] device bond0 entered promiscuous mode [ 759.012841][ T4980] device bond_slave_0 entered promiscuous mode [ 759.022373][ T4980] device bond_slave_1 entered promiscuous mode [ 759.061694][ T4980] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 759.180012][ T4980] device bond0 left promiscuous mode [ 759.186101][ T4980] device bond_slave_0 left promiscuous mode [ 759.195022][ T4980] device bond_slave_1 left promiscuous mode [ 759.211631][ T4994] affs: Unrecognized mount option "!%@" or missing value [ 759.218915][ T4994] affs: Error parsing options 23:54:40 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 759.625169][ T4980] device bond0 entered promiscuous mode [ 759.630849][ T4980] device bond_slave_0 entered promiscuous mode [ 759.637370][ T4980] device bond_slave_1 entered promiscuous mode [ 759.644054][ T4980] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 759.667346][ T4980] device bond0 left promiscuous mode [ 759.672685][ T4980] device bond_slave_0 left promiscuous mode [ 759.679093][ T4980] device bond_slave_1 left promiscuous mode 23:54:41 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x10, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xff0f0000}, 0x0) 23:54:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000210000000001000"}) 23:54:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xcf}) 23:54:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000e10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 760.276874][ T5031] device bond0 entered promiscuous mode [ 760.284109][ T5031] device bond_slave_0 entered promiscuous mode [ 760.297943][ T5031] device bond_slave_1 entered promiscuous mode [ 760.317514][ T5031] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:41 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xffffa888}, 0x0) [ 760.390176][ T5034] affs: Unrecognized mount option "!%@" or missing value [ 760.398053][ T5034] affs: Error parsing options 23:54:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000310000000001000"}) 23:54:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:41 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xfe}) [ 760.633777][ T5031] device bond0 left promiscuous mode [ 760.639705][ T5031] device bond_slave_0 left promiscuous mode [ 760.649000][ T5031] device bond_slave_1 left promiscuous mode [ 760.944937][ T5060] affs: Unrecognized mount option "!%@" or missing value [ 760.952445][ T5060] affs: Error parsing options 23:54:42 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x11, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001110000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000410000000001000"}) 23:54:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xffffff7f}, 0x0) 23:54:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}], [], 0xff}) 23:54:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xffffff9e}, 0x0) 23:54:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001210000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 761.322391][ T5086] affs: Unrecognized mount option "!%@" or missing value [ 761.329540][ T5086] affs: Error parsing options [ 761.410893][ T5085] device bond0 entered promiscuous mode [ 761.417287][ T5085] device bond_slave_0 entered promiscuous mode [ 761.425474][ T5085] device bond_slave_1 entered promiscuous mode [ 761.449835][ T5085] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000510000000001000"}) 23:54:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='!2D,\x00']) 23:54:42 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 761.573005][ T5085] device bond0 left promiscuous mode [ 761.585205][ T5085] device bond_slave_0 left promiscuous mode [ 761.594611][ T5085] device bond_slave_1 left promiscuous mode [ 762.048772][ T5110] affs: Unrecognized mount option "!2D" or missing value [ 762.056505][ T5110] affs: Error parsing options [ 762.097545][ T5085] device bond0 entered promiscuous mode [ 762.103132][ T5085] device bond_slave_0 entered promiscuous mode [ 762.109596][ T5085] device bond_slave_1 entered promiscuous mode [ 762.116768][ T5085] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 762.172936][ T5085] device bond0 left promiscuous mode [ 762.178675][ T5085] device bond_slave_0 left promiscuous mode [ 762.184710][ T5085] device bond_slave_1 left promiscuous mode 23:54:43 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:43 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xffffffef}, 0x0) 23:54:43 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001810000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:43 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:43 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000610000000001000"}) 23:54:43 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2d, 0x1, 0x5, 0x8, 0x0, 0x8, 0x10, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffff7fff, 0x1, @perf_config_ext={0x8, 0xab9d}, 0x40, 0x2e4, 0x8, 0x6, 0x7fffffff, 0x0, 0x5, 0x0, 0x7ff, 0x0, 0x100}, 0x0, 0x7, r0, 0x9) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 762.549738][ T5140] affs: Unrecognized mount option "!%@" or missing value [ 762.557064][ T5140] affs: Error parsing options 23:54:44 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xfffffff0}, 0x0) 23:54:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000002510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000710000000001000"}) [ 762.737229][ T5141] device bond0 entered promiscuous mode [ 762.743725][ T5141] device bond_slave_0 entered promiscuous mode [ 762.754561][ T5141] device bond_slave_1 entered promiscuous mode [ 762.775566][ T5141] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xb) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c00d0976cf000"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000000000000a0001007273767036000000040002000600050004000000"], 0x3c}}, 0x0) read$FUSE(r0, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x80, 0x6, 0x68, 0x0, 0x0, 0x8, 0x2, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x4, @perf_bp={&(0x7f00000003c0), 0x9}, 0x8400, 0x2, 0x7ff, 0x8, 0xb5, 0x58, 0x6, 0x0, 0x9, 0x0, 0x5}, r4, 0x0, r0, 0x2) r5 = memfd_secret(0x0) sendmsg$nl_route_sched(r5, &(0x7f0000003440)={&(0x7f0000002ac0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003400)={&(0x7f0000002b00)=@newchain={0x8e4, 0x64, 0x20, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xb, 0x6}, {0x7, 0xf}, {0x0, 0x3}}, [@filter_kind_options=@f_bpf={{0x8}, {0x8b8, 0x2, [@TCA_BPF_CLASSID={0x8, 0x3, {0xf, 0x7}}, @TCA_BPF_OPS={{0x6, 0x4, 0x2}, {0x14, 0x5, [{0x9, 0xd7, 0x7, 0x3f}, {0x1, 0x4, 0x1, 0xff}]}}, @TCA_BPF_CLASSID={0x8, 0x3, {0xfff3, 0x9}}, @TCA_BPF_FLAGS={0x8}, @TCA_BPF_FLAGS_GEN={0x8}, @TCA_BPF_POLICE={0x824, 0x2, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x9}, @TCA_POLICE_RATE={0x404, 0x2, [0xfff, 0x36c, 0x7, 0x9, 0x8001, 0xdc3, 0xa68, 0x3, 0x92, 0x80000000, 0xfffff0f7, 0x400, 0x2ec, 0x4, 0x1000, 0x1, 0x1f, 0x2b10, 0x6, 0xb1cc, 0x29cc, 0x8, 0xbd, 0x7, 0xb9e, 0x82, 0x3, 0x9, 0x3, 0x7, 0xfff, 0x3f, 0x4, 0xdf7, 0x0, 0x20, 0xff, 0xbd, 0x3, 0x9, 0xd1, 0x4, 0x40000, 0x800, 0x20, 0x4, 0x0, 0x8000, 0x1, 0x3, 0xfffffffd, 0x0, 0x5, 0x4, 0x0, 0x2, 0x1, 0x2, 0x1ff, 0x2, 0x3ff, 0xa1a, 0x85ac, 0x2, 0x4, 0x4, 0x3f, 0x4f0, 0xffff, 0x400, 0x1, 0x6, 0x3, 0x9, 0x2, 0x3, 0x100, 0x0, 0xfffffffe, 0x80, 0x80, 0x5, 0x81, 0x2, 0x81, 0x80, 0x5, 0x401, 0xf2, 0x1000, 0x2, 0x8001, 0xfffff000, 0x1f, 0x8001, 0x1, 0x8001, 0x1000, 0x6268, 0x800, 0x7, 0x2, 0xba, 0xfffffffc, 0xffffffec, 0x8, 0x0, 0x8, 0xffff5bf7, 0x200, 0xfffff949, 0x2, 0x6, 0x6, 0x4, 0x5, 0x9, 0x9c2, 0x4, 0x9, 0x2, 0x8, 0x1f, 0xfffffffb, 0xd5, 0xfffffffa, 0x1000, 0x313, 0x4, 0x4, 0x52, 0x8001, 0x10001, 0x3, 0x2, 0x9, 0x18, 0x7, 0x188, 0x1, 0x101, 0xd6, 0x3f, 0x7, 0x1, 0xe6d, 0x7, 0x1f, 0x40, 0x9, 0x4, 0x4, 0x3f, 0x80000001, 0x2, 0x244e, 0x9, 0x1, 0xd1, 0x336c, 0x5, 0x4, 0x5, 0x2f45, 0x5, 0x5, 0xd6, 0x2, 0x8, 0x5, 0x3, 0x3, 0xb6f, 0x4, 0x54aac1d0, 0x6, 0x1, 0x5, 0x1cc0, 0x20, 0x7, 0x10001, 0x8b7, 0x4, 0x1ff, 0x10001, 0xffff8000, 0x8000, 0x8, 0x3, 0x200, 0x8001, 0x8, 0x1, 0x6, 0x800, 0x20, 0xffffffff, 0x9, 0x7, 0x7c82, 0x3f, 0x0, 0x8, 0x800, 0x1000, 0x8001, 0x3, 0x101, 0x1000, 0x9, 0x4, 0x80, 0x4, 0x20, 0x0, 0x4, 0x3, 0x0, 0x4, 0x1, 0x7f, 0xffffffff, 0x5, 0x5, 0x7, 0x1, 0x200, 0x5, 0x8, 0x1000, 0xffffffff, 0x10001, 0x5, 0x1ff, 0x6, 0x7, 0x0, 0x2e, 0x0, 0x9, 0x2, 0x0, 0x3, 0x6, 0x1000, 0x535, 0x9, 0x6, 0x7, 0x7, 0x2, 0x8, 0x4, 0x2f8, 0x20]}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x6}, @TCA_POLICE_RATE={0x404, 0x2, [0x6, 0x9, 0x0, 0x101, 0x1000, 0x9814, 0xc1, 0x1, 0x2, 0x3, 0xffffffff, 0x8b, 0xffff0000, 0x100, 0x9, 0x5, 0x2, 0x2, 0xffff, 0x3f, 0x1, 0x10000, 0x1ff, 0x5, 0x9, 0x400, 0x81, 0x101, 0x1, 0x6, 0x2, 0x9, 0x3, 0xffffffff, 0xff, 0x4, 0x0, 0x9, 0x200, 0x6, 0x83f7, 0x200, 0x80, 0x10001, 0x504c2476, 0x91, 0x2, 0x10001, 0x8, 0x4, 0x8001, 0x20, 0x6, 0xfffffffd, 0x40, 0x1, 0x4, 0x3, 0x6, 0x9, 0x40, 0x400, 0xfffffffb, 0x3ff, 0x2, 0xffff, 0x4c, 0x9, 0x4, 0x200, 0x3, 0x1, 0x70aa, 0xfff, 0x0, 0x20, 0xe08, 0x1, 0x4, 0x8001, 0x7, 0x68e, 0xe55, 0x20, 0xff, 0x0, 0xffff, 0x5, 0x7, 0x2, 0x6, 0x1, 0x400, 0x4, 0x7, 0x7fffffff, 0xffff, 0x1, 0x3ce7, 0xffffff51, 0x1, 0x400, 0xff, 0x7, 0x62446663, 0x3, 0x0, 0x6, 0x1981, 0x4, 0x1f, 0xed7, 0x7, 0x6, 0xa2a, 0xde32, 0x7, 0x4, 0x9, 0x6cc12913, 0x7, 0x5, 0x7, 0x7, 0x4d8, 0x2, 0x7, 0x800, 0x8, 0x800, 0x1f43, 0x6, 0x80, 0x1, 0x5, 0xb60, 0x3, 0xfec4, 0x2, 0x4, 0x7, 0x1, 0xfffff2af, 0x0, 0x8, 0x6, 0xeed, 0xfffffff8, 0x81, 0x4, 0x10000, 0x9, 0x4, 0xff, 0x100, 0xffffffc1, 0x3, 0x80000000, 0x2, 0x3, 0x4, 0x8, 0x1, 0x6, 0x84bd, 0x9, 0x2, 0x1, 0x7fffffff, 0xfffffffe, 0x6, 0x50, 0x1, 0x2, 0x3ff, 0x8, 0x10000, 0x1000, 0x3ff, 0x6, 0x2, 0x1f, 0xbab2, 0x9, 0x8001, 0x2, 0x4, 0x80, 0x1000, 0x7, 0xd59, 0x7, 0x0, 0x72, 0xd3ae, 0x0, 0x6, 0x4, 0x864, 0x3, 0x10001, 0x200, 0x401, 0x9, 0x40, 0x6, 0x7f, 0x2, 0x9, 0xa0, 0x1, 0x7f, 0x8, 0x2, 0x3b0, 0x1, 0x87, 0x80, 0x81, 0x6, 0x0, 0x9ff, 0x5a24, 0x7ff, 0x0, 0x5, 0x4, 0x6, 0x400, 0x100, 0x1, 0xfffffffb, 0x18a, 0x7, 0x5, 0x9, 0x9a46, 0x10001, 0x9, 0x8, 0x1, 0x7, 0xffffffff, 0x8, 0x6, 0x9c, 0x9, 0x6, 0x8001, 0x5, 0x3940, 0x8, 0x3ff, 0x800, 0x3, 0x1]}]}, @TCA_BPF_FLAGS={0x8}, @TCA_BPF_OPS={{0x6, 0x4, 0x8}, {0x44, 0x5, [{0xe5, 0xf5, 0x9, 0x8}, {0x101, 0x1, 0x77, 0xfffffffb}, {0x2, 0x6, 0x7, 0x1}, {0x401, 0x7f, 0x6, 0xfffffeff}, {0xff, 0x1, 0x40, 0x8b9e}, {0x1, 0x0, 0x7, 0xfffffff9}, {0x7e5, 0x5, 0xf9, 0xb2}, {0x1, 0x4, 0xff, 0x8}]}}]}}]}, 0x8e4}, 0x1, 0x0, 0x0, 0x89c1}, 0x4000) r6 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r6, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r6, 0x541c, 0x0) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000380)) recvmsg$can_raw(r6, &(0x7f0000002780)={&(0x7f00000024c0)=@ax25={{0x3, @netrom}, [@rose, @bcast, @null, @null, @default, @bcast, @netrom, @null]}, 0x80, &(0x7f00000026c0)=[{&(0x7f0000002540)=""/113, 0x71}, {&(0x7f00000025c0)=""/72, 0x48}, {&(0x7f0000002640)=""/80, 0x50}], 0x3, &(0x7f0000002700)=""/76, 0x4c}, 0x100) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)=@newqdisc={0x200, 0x24, 0x400, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r3, {0x10, 0x2}, {0xfff3, 0x3}, {0x6, 0xfff2}}, [@TCA_STAB={0x19c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xa5, 0x1, 0xff, 0xfffffff7, 0x2, 0x12d1, 0xffff, 0x1}}, {0x6, 0x2, [0x7]}}, {{0x1c, 0x1, {0x7, 0x4, 0xc9, 0x9, 0x0, 0x401, 0x9, 0x8}}, {0x14, 0x2, [0x3f, 0x3, 0x6, 0x0, 0x0, 0x3, 0xfff, 0x3f]}}, {{0x1c, 0x1, {0x81, 0x5, 0x4, 0x4, 0x0, 0x2, 0xff, 0x3}}, {0xa, 0x2, [0xed, 0x6, 0x3e]}}, {{0x1c, 0x1, {0x4, 0x6, 0x40, 0x2, 0x3c2a862411cc1987, 0xffffffff, 0xbcb, 0x6}}, {0x10, 0x2, [0x1f, 0x0, 0x2, 0x1, 0x7, 0x8000]}}, {{0x1c, 0x1, {0x2, 0x8, 0x1000, 0xd5e5, 0x0, 0x1, 0x8, 0x8}}, {0x14, 0x2, [0xe951, 0x3, 0x1, 0xff, 0x4, 0x8000, 0x0, 0x2]}}, {{0x1c, 0x1, {0x1f, 0x7, 0x7, 0x17e, 0x1, 0xfff, 0x32, 0x3}}, {0xa, 0x2, [0x100, 0x3f, 0xfff8]}}, {{0x1c, 0x1, {0x80, 0x7f, 0x7fff, 0x2, 0x0, 0x6, 0xef, 0x1}}, {0x6, 0x2, [0x0]}}, {{0x1c, 0x1, {0x1, 0x81, 0x526e, 0x7, 0x1, 0x1, 0x101, 0x1}}, {0x6, 0x2, [0x55c]}}, {{0x1c, 0x1, {0x0, 0x9, 0x0, 0x6, 0x2, 0x3, 0x2, 0x2}}, {0x8, 0x2, [0x0, 0xb6]}}, {{0x1c, 0x1, {0x1, 0x4, 0x1, 0x7, 0x1, 0x0, 0x0, 0x5}}, {0xe, 0x2, [0x8000, 0x1, 0x7, 0xef, 0x8000]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x3ff}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0xffff0001}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xffff}, @qdisc_kind_options=@q_dsmark={{0xb}, {0x14, 0x2, [@TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0xbba}, @TCA_DSMARK_DEFAULT_INDEX={0x6, 0x2, 0x3ff}]}}, @TCA_RATE={0x6, 0x5, {0x0, 0x1}}]}, 0x200}, 0x1, 0x0, 0x0, 0x20040880}, 0x40) write$cgroup_type(r0, &(0x7f00000027c0), 0x9) [ 762.920511][ T5141] device bond0 left promiscuous mode [ 762.926805][ T5141] device bond_slave_0 left promiscuous mode [ 762.962280][ T5141] device bond_slave_1 left promiscuous mode 23:54:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000004010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:44 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x16, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:44 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000810000000001000"}) 23:54:44 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x40030000000000}, 0x0) 23:54:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 763.551860][ T5168] affs: Unrecognized mount option "" or missing value [ 763.559889][ T5168] affs: Error parsing options 23:54:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000055410000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 763.759425][ T5168] affs: Unrecognized mount option "" or missing value [ 763.766926][ T5168] affs: Error parsing options 23:54:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005c10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000910000000001000"}) 23:54:45 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x100000000000000}, 0x0) 23:54:45 executing program 1: r0 = getpid() recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f00000001c0), 0x0, &(0x7f0000000300)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x58}, 0x40) sched_setscheduler(r1, 0x5, &(0x7f0000000440)=0x3) perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x41c1, 0x8162d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0xa) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="795db4a8899a2c9f8aa9d662f3ede7aadc782e70a27d692818a070b189a1b1e084024afa4faff6b5ade28183af38c06489ac86a9e2739ef79ea03d23d020a812c088b1e2e50dea5743e9bbd77fe16f4625f0cd71b227a2ddcd2c3670ef8c0244c1ff916e2115c140db486eb7e34b82681226d3155f63307e613450006807a22fae128dfdd5f6fe33842e07d7b1abcea25591bd6b6de4ad9ae2391ff63c58a5f31e28c944bd59aa68f67e31a129318656207e4f1045451d125494b18a6d6cea9177c9c0d3c0c42d578693c61f850359c4"]) r2 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x7, 0x5, 0x2, 0x1, 0x0, 0x4, 0x200, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x10000, 0xc8e, 0x7ed, 0x5, 0x0, 0x433f, 0x1, 0x0, 0x5, 0x0, 0x80000001}, 0xffffffffffffffff, 0xc, r2, 0xa) [ 763.950838][ T5195] device bond0 entered promiscuous mode [ 763.957300][ T5195] device bond_slave_0 entered promiscuous mode [ 763.965916][ T5195] device bond_slave_1 entered promiscuous mode [ 763.985540][ T5195] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, 0x0) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 764.168044][ T5195] device bond0 left promiscuous mode [ 764.173564][ T5195] device bond_slave_0 left promiscuous mode [ 764.181776][ T5195] device bond_slave_1 left promiscuous mode 23:54:45 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 764.245069][ T5220] affs: Unrecognized mount option "y]´¨‰š" or missing value [ 764.252599][ T5220] affs: Error parsing options 23:54:46 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x18, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000a10000000001000"}) 23:54:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x200000000000000}, 0x0) 23:54:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000007a10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:46 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x300000000000000}, 0x0) [ 765.144104][ T5247] device bond0 entered promiscuous mode [ 765.147626][ T5256] affs: Unrecognized mount option "y]´¨‰š" or missing value [ 765.150244][ T5247] device bond_slave_0 entered promiscuous mode [ 765.157543][ T5256] affs: Error parsing options [ 765.170979][ T5247] device bond_slave_1 entered promiscuous mode 23:54:46 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000b10000000001000"}) 23:54:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0ce7541b56c9dca0c60f28090000003c9d40"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 765.192193][ T5247] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000ffffff8010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 765.222510][ T5247] device bond0 left promiscuous mode [ 765.228686][ T5247] device bond_slave_0 left promiscuous mode [ 765.238631][ T5247] device bond_slave_1 left promiscuous mode 23:54:47 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x200a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x8, 0x1, 0x6, 0x39, 0x0, 0x3, 0xe8216e9241c6ca68, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x1, 0x6}, 0x2730, 0x9, 0x170, 0x9, 0x6a, 0x6, 0x8, 0x0, 0x30aac454, 0x0, 0x2}, 0xffffffffffffffff, 0x9, r0, 0x5) 23:54:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x400000000000000}, 0x0) 23:54:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, 0x0, 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 765.640820][ T5247] device bond0 entered promiscuous mode [ 765.646570][ T5247] device bond_slave_0 entered promiscuous mode [ 765.652858][ T5247] device bond_slave_1 entered promiscuous mode [ 765.659600][ T5247] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 765.696469][ T5247] device bond0 left promiscuous mode [ 765.701841][ T5247] device bond_slave_0 left promiscuous mode [ 765.708300][ T5247] device bond_slave_1 left promiscuous mode [ 765.761445][ T5286] affs: Unrecognized mount option "!%@" or missing value [ 765.768604][ T5286] affs: Error parsing options 23:54:47 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x21, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000c10000000001000"}) 23:54:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000ffffff8110000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x500000000000000}, 0x0) 23:54:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, 0x0, 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 765.865782][ T5286] affs: Unrecognized mount option "!%@" or missing value [ 765.872884][ T5286] affs: Error parsing options 23:54:47 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, 0x0, 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x600000000000000}, 0x0) 23:54:47 executing program 1: r0 = syz_open_dev$hidraw(&(0x7f0000000000), 0x40, 0x0) syz_open_dev$hidraw(&(0x7f0000000080), 0x3c, 0x20880) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:54:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000ffffff8210000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:47 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000d10000000001000"}) [ 766.246654][ T5311] device bond0 entered promiscuous mode [ 766.253082][ T5311] device bond_slave_0 entered promiscuous mode [ 766.262809][ T5311] device bond_slave_1 entered promiscuous mode [ 766.280885][ T5311] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:47 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x700000000000000}, 0x0) [ 766.321851][ T5311] device bond0 left promiscuous mode [ 766.328347][ T5311] device bond_slave_0 left promiscuous mode [ 766.340372][ T5311] device bond_slave_1 left promiscuous mode 23:54:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080), 0x8a501, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0), 0x103000, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x8, 0x3, 0x1f, 0x0, 0x8, 0x4, 0xb, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x8, 0xffffffff}, 0x10, 0x7fffffff, 0x1000, 0x0, 0x65, 0x4, 0x7, 0x0, 0x400, 0x0, 0x2}, r1, 0xc, r2, 0x6) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 766.560479][ T5335] affs: Unrecognized mount option "!%@" or missing value [ 766.567913][ T5335] affs: Error parsing options [ 766.640187][ T5343] affs: Unrecognized mount option "!%@" or missing value [ 766.647417][ T5343] affs: Error parsing options 23:54:48 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x25, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000e10000000001000"}) 23:54:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000edf10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x800000000000000}, 0x0) 23:54:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x2, &(0x7f00000000c0)=ANY=[@ANYBLOB="21252117467e7f24263d0ed193eb402c000fbeea207c00"]) 23:54:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000fffffdfd10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 766.894732][ T5362] affs: Unrecognized mount option "!%!F~$&=Ñ“ë@" or missing value [ 766.902985][ T5362] affs: Error parsing options 23:54:48 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001010000000001000"}) 23:54:48 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x900000000000000}, 0x0) 23:54:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001110000000001000"}) 23:54:48 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001210000000001000"}) [ 767.145613][ T5366] device bond0 entered promiscuous mode [ 767.151806][ T5366] device bond_slave_0 entered promiscuous mode [ 767.162173][ T5366] device bond_slave_1 entered promiscuous mode [ 767.182300][ T5366] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 767.368542][ T5366] device bond0 left promiscuous mode [ 767.374287][ T5366] device bond_slave_0 left promiscuous mode [ 767.389501][ T5366] device bond_slave_1 left promiscuous mode [ 767.686004][ T5397] device bond0 entered promiscuous mode [ 767.691599][ T5397] device bond_slave_0 entered promiscuous mode [ 767.697953][ T5397] device bond_slave_1 entered promiscuous mode [ 767.704682][ T5397] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 767.717126][ T5397] device bond0 left promiscuous mode [ 767.722450][ T5397] device bond_slave_0 left promiscuous mode [ 767.728919][ T5397] device bond_slave_1 left promiscuous mode 23:54:49 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:49 executing program 1: r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[0x7ff, 0x8, 0x1, 0x1ff, 0x8, 0xfc32, 0x5, 0x4]}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:54:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001810000000001000"}) 23:54:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xa00000000000000}, 0x0) 23:54:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000ff10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 768.131741][ T5412] affs: Unrecognized mount option "!%@" or missing value [ 768.140530][ T5412] affs: Error parsing options 23:54:49 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000002510000000001000"}) 23:54:49 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xb00000000000000}, 0x0) 23:54:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000fdfdffff10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:49 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 768.285357][ T5421] device bond0 entered promiscuous mode [ 768.291446][ T5421] device bond_slave_0 entered promiscuous mode [ 768.301884][ T5421] device bond_slave_1 entered promiscuous mode [ 768.321137][ T5421] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 768.332135][ T5433] affs: Unrecognized mount option "!%@" or missing value [ 768.339378][ T5433] affs: Error parsing options 23:54:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000080ffffff10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 768.448725][ T5421] device bond0 left promiscuous mode [ 768.454366][ T5421] device bond_slave_0 left promiscuous mode [ 768.476244][ T5421] device bond_slave_1 left promiscuous mode 23:54:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x40, 0x3, 0x0, 0xfb, 0x0, 0x7, 0x10000, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x1}, 0x20, 0xd7f, 0x1, 0x6, 0x8001, 0x7ff, 0x8, 0x0, 0x2, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r0, 0x2) 23:54:50 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2f, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000004010000000001000"}) 23:54:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000081ffffff10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xc00000000000000}, 0x0) 23:54:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xd00000000000000}, 0x0) [ 769.191815][ T5465] affs: Unrecognized mount option "!%@" or missing value [ 769.200028][ T5465] affs: Error parsing options [ 769.254091][ T5468] device bond0 entered promiscuous mode [ 769.264606][ T5468] device bond_slave_0 entered promiscuous mode [ 769.273765][ T5468] device bond_slave_1 entered promiscuous mode [ 769.300567][ T5468] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:50 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000055410000000001000"}) 23:54:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000082ffffff10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:50 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 769.458988][ T5465] affs: Unrecognized mount option "!%@" or missing value [ 769.466504][ T5465] affs: Error parsing options [ 769.502120][ T5468] device bond0 left promiscuous mode [ 769.517351][ T5468] device bond_slave_0 left promiscuous mode [ 769.527111][ T5468] device bond_slave_1 left promiscuous mode 23:54:50 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xe00000000000000}, 0x0) 23:54:51 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0/file0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r1 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x2, 0x81, 0x8, 0x3, 0x0, 0xaf52, 0x802, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0x1}, 0x44038, 0x10001, 0x3, 0x0, 0x7, 0x27e5, 0xff00, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xb, r1, 0xa) [ 769.943094][ T5512] device bond0 entered promiscuous mode [ 769.948866][ T5512] device bond_slave_0 entered promiscuous mode [ 769.955227][ T5512] device bond_slave_1 entered promiscuous mode [ 769.961897][ T5512] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 770.027293][ T5512] device bond0 left promiscuous mode [ 770.032676][ T5512] device bond_slave_0 left promiscuous mode [ 770.038796][ T5512] device bond_slave_1 left promiscuous mode [ 770.089641][ T5511] affs: Unrecognized mount option "!%@" or missing value [ 770.109531][ T5511] affs: Error parsing options 23:54:51 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000000a000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:51 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xf00000000000000}, 0x0) 23:54:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="00ab08006ecaa000"]) r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) r1 = getgid() r2 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x0, 0x80) getsockname$packet(r0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000340)=0x14) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=@getchain={0x74, 0x66, 0x10, 0x70bd27, 0x25dfdbfe, {0x0, 0x0, 0x0, r3, {0x3, 0x7}, {0x6, 0xa}, {0xe, 0x8}}, [{0x8, 0xb, 0x1ff}, {0x8, 0xb, 0x7ff}, {0x8, 0xb, 0x7137000}, {0x8}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x1}, {0x8, 0xb, 0x7fdd}, {0x8, 0xb, 0x6}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0xfbf9}]}, 0x74}}, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x1, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xee00}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0xfffffffffffffff9}}, {@max_read={'max_read', 0x3d, 0x80000000}}, {@max_read={'max_read', 0x3d, 0x8}}], [{@appraise}, {@subj_user={'subj_user', 0x3d, 'affs\x00'}}, {@subj_type={'subj_type', 0x3d, 'affs\x00'}}, {@pcr={'pcr', 0x3d, 0x10}}]}}) 23:54:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005c10000000001000"}) 23:54:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000007a10000000001000"}) 23:54:51 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000002000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 770.540068][ T5540] device bond0 entered promiscuous mode [ 770.546262][ T5540] device bond_slave_0 entered promiscuous mode [ 770.557315][ T5540] device bond_slave_1 entered promiscuous mode [ 770.562332][ T5538] affs: No valid root block on device loop1 [ 770.578708][ T5540] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 770.671028][ T5540] device bond0 left promiscuous mode [ 770.677374][ T5540] device bond_slave_0 left promiscuous mode [ 770.686933][ T5540] device bond_slave_1 left promiscuous mode [ 770.746460][ T5538] fuse: Bad value for 'user_id' 23:54:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x1000000000000000}, 0x0) 23:54:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000ffffff8010000000001000"}) 23:54:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000003000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 771.199515][ T5538] affs: No valid root block on device loop1 [ 771.262861][ T5580] fuse: Bad value for 'user_id' [ 771.284589][ T5540] device bond0 entered promiscuous mode [ 771.290266][ T5540] device bond_slave_0 entered promiscuous mode [ 771.296632][ T5540] device bond_slave_1 entered promiscuous mode [ 771.303300][ T5540] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 771.345930][ T5540] device bond0 left promiscuous mode [ 771.351296][ T5540] device bond_slave_0 left promiscuous mode [ 771.357468][ T5540] device bond_slave_1 left promiscuous mode 23:54:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000004000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:52 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c13b8bcb1664508e0c"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:52 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x1100000000000000}, 0x0) 23:54:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000ffffff8110000000001000"}) 23:54:52 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x41, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[]) [ 771.787890][ T5597] affs: No valid root block on device loop1 23:54:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 771.830260][ T5604] device bond0 entered promiscuous mode [ 771.837340][ T5604] device bond_slave_0 entered promiscuous mode [ 771.847037][ T5604] device bond_slave_1 entered promiscuous mode [ 771.865345][ T5604] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 771.934833][ T5604] device bond0 left promiscuous mode [ 771.944367][ T5604] device bond_slave_0 left promiscuous mode [ 771.953024][ T5604] device bond_slave_1 left promiscuous mode 23:54:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x6}, 0x0, 0x8, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2125402c00ac784b3ba6d08823c7c4ae4100009abda9a2949c40b5cf4383d6d417a96a66be4d96be92c224c1572e14de71386c5aa990acf391fbe3052ce53948ea981fefa1bb507b49ab7446599c07d0ee4697fb44cdad6a9c341eef58e54796216f289990fc0532d19d1818fed5399fbaf2a38a6d05c2e1387814372f94876ab87ae4b8e04b0d9786c5c1dbe6b691812189cb464510ea4ed0e140578c50d772ad3f7644cd71df1253744eaa8bfcb170"]) 23:54:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000ffffff8210000000001000"}) 23:54:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x1200000000000000}, 0x0) 23:54:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 772.221128][ T5620] affs: Unrecognized mount option "!%@" or missing value [ 772.228425][ T5620] affs: Error parsing options 23:54:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000006000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:53 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000edf10000000001000"}) 23:54:53 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x2500000000000000}, 0x0) 23:54:53 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="cdf0452f188eff396235c2e9876390ce2125402c01fdef43dd8a23ef9477d13adbfca7248b635df883140ad14b5eed8a9d7224a638eaa2248af3a43a7bfa3096ae26eda1d7c3abc339410850f5342e33c05663ae7876134358f600000000000000000000bd63de3d3d30f5a7fbcbdbfced7691164ae5c020b2af7d0279f07d86a89e133e68d7f4dc4a336188a176e079af382de69478d5a307673b59e1f3"]) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x0, 0x8, 0x5, 0x4, 0x0, 0x7f, 0x81200, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x4012, 0x3, 0xffffffff, 0x1, 0x100000000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x80000000}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) 23:54:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d387ee80c1"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:53 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000007000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000fffffdfd10000000001000"}) 23:54:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x6000000000000000}, 0x0) [ 772.851929][ T5653] device bond0 entered promiscuous mode [ 772.858434][ T5653] device bond_slave_0 entered promiscuous mode [ 772.868759][ T5653] device bond_slave_1 entered promiscuous mode [ 772.895609][ T5653] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 772.996645][ T5651] affs: Unrecognized mount option "ÍðE/Žÿ9b5Âé‡cÎ!%@" or missing value [ 773.005396][ T5651] affs: Error parsing options [ 773.019351][ T5653] device bond0 left promiscuous mode [ 773.025341][ T5653] device bond_slave_0 left promiscuous mode [ 773.034125][ T5653] device bond_slave_1 left promiscuous mode 23:54:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000008000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:54 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000ff10000000001000"}) [ 773.137548][ T5651] affs: Unrecognized mount option "ÍðE/Žÿ9b5Âé‡cÎ!%@" or missing value [ 773.146101][ T5651] affs: Error parsing options 23:54:54 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:54 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x6558000000000000}, 0x0) [ 773.477134][ T5653] device bond0 entered promiscuous mode [ 773.482731][ T5653] device bond_slave_0 entered promiscuous mode [ 773.489304][ T5653] device bond_slave_1 entered promiscuous mode [ 773.496006][ T5653] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 773.535040][ T5653] device bond0 left promiscuous mode [ 773.540367][ T5653] device bond_slave_0 left promiscuous mode [ 773.546578][ T5653] device bond_slave_1 left promiscuous mode 23:54:55 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x300067) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0xc2, 0xd2, 0x7, 0x0, 0xd0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10, 0x7, 0x401, 0x1, 0x8, 0x0, 0xffff, 0x0, 0x9, 0x0, 0x101}, r0, 0x7, 0xffffffffffffffff, 0x3) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="34c055940066a58bc88e7d2c4cc375c4d4c2fd3e869513fb02b3f3c724cc8613288b6ddf3207b2005bfff06c006bdfa8c6c036b7c4794fc896cf5b13ad165b818fa478f000d22010d04a1280da8f251160c8e83b48e39d285f9a096e07da647d5686b2e77806b06c5e56bb4b487b0c001ed5fb5a68c71b6fe83ad2"]) rt_sigqueueinfo(r0, 0xf42, &(0x7f0000000480)={0x21, 0xffff865a}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newlink={0x58, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_VFINFO_LIST={0x30, 0x16, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x2, {0x81000000, @local}}]}]}]}, 0x58}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000006c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)=@newlink={0x124, 0x10, 0x304, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x800, 0xc000}, [@IFLA_IFNAME={0x14, 0x3, 'sit0\x00'}, @IFLA_PORT_SELF={0x7c, 0x19, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "0504f6d00463824304ce172ceb50226a"}, @IFLA_PORT_VF={0x8, 0x1, 0x120000}, @IFLA_PORT_PROFILE={0xb, 0x2, '*\xc9&+%*\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x6e}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_VF={0x8, 0x1, 0x8001}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a95b24612d58b01f5cdd3d023ed3af7e"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "534a7d00ef49dc59388ad3dfae4b7ddf"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_PROFILE={0x6, 0x2, '!\x00'}]}, @IFLA_NET_NS_PID={0x8, 0x13, r0}, @IFLA_OPERSTATE={0x5, 0x10, 0x80}, @IFLA_GROUP={0x8, 0x1b, 0x20000}, @IFLA_PROP_LIST={0x54, 0x34, 0x0, 0x1, [{0x14, 0x35, 'xfrm0\x00'}, {0x14, 0x35, 'team0\x00'}, {0x14, 0x35, 'netdevsim0\x00'}, {0x14, 0x35, 'ip6_vti0\x00'}]}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x3}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000084}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='\x00') syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000140)="8199e8a8e078ed5e5118184de17785bb0753c0cb0e19c8c1b2fadf23ed89abcc42964c0441bc42c85957bab63368c6d031f6478a6ccd8d40bbbc5bdf9e27ecceb7f717a129fd3749aa96fce1bdd1520d953280fa9b85c96a73bc23285f6deee8949d2bc6cf18ace950ff2ec8389bf331efb093d13c89c8221da44fc0fae34d97df1b0cf2371d13539918c77229b58c7718367e009b4c5294905a48bb585c11045eda18c2a7b7374d5e69eb098044c5e7fc94f299e08632b37ff9b5c081aee476fc87a7c199", 0xc5}, {&(0x7f0000000240)="c2607424a4bb6be7c0b58cc354a1ce", 0xf, 0x10000}, {&(0x7f0000000280), 0x0, 0x6}], 0x1084841, &(0x7f0000000340)=ANY=[@ANYBLOB="a125402c2125402c7b2f29275d292121235c235d122c61666673000700000000000000655f747970653d696d617369672c00"]) 23:54:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013d3"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000009000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000fdfdffff10000000001000"}) 23:54:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8000000000000000}, 0x0) 23:54:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8100000000000000}, 0x0) 23:54:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 774.028865][ T5714] device bond0 entered promiscuous mode [ 774.034803][ T5714] device bond_slave_0 entered promiscuous mode [ 774.044060][ T5714] device bond_slave_1 entered promiscuous mode [ 774.065077][ T5714] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 774.117785][ T5718] loop1: detected capacity change from 0 to 256 23:54:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000a000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:55 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000080ffffff10000000001000"}) [ 774.216627][ T5714] device bond0 left promiscuous mode [ 774.222592][ T5714] device bond_slave_0 left promiscuous mode [ 774.231787][ T5714] device bond_slave_1 left promiscuous mode 23:54:55 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8300000000000000}, 0x0) [ 774.591283][ T5716] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 774.611673][ T5718] affs: Unrecognized mount option "4ÀU”" or missing value [ 774.619150][ T5718] affs: Error parsing options [ 774.731411][ T5714] device bond0 entered promiscuous mode [ 774.737086][ T5714] device bond_slave_0 entered promiscuous mode [ 774.743370][ T5714] device bond_slave_1 entered promiscuous mode [ 774.750236][ T5714] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 774.762267][ T5752] loop1: detected capacity change from 0 to 256 [ 774.773853][ T5714] device bond0 left promiscuous mode [ 774.779569][ T5714] device bond_slave_0 left promiscuous mode [ 774.785670][ T5714] device bond_slave_1 left promiscuous mode [ 774.813430][ T5708] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. 23:54:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000b000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000081ffffff10000000001000"}) 23:54:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8847000000000000}, 0x0) 23:54:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="3e2540ac00"]) faccessat(r0, &(0x7f0000000080)='./file1\x00', 0x18) 23:54:56 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4c, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:56 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000082ffffff10000000001000"}) [ 775.332161][ T5778] device bond0 entered promiscuous mode [ 775.338755][ T5778] device bond_slave_0 entered promiscuous mode [ 775.348990][ T5778] device bond_slave_1 entered promiscuous mode 23:54:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000c000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:56 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 775.379836][ T5778] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 775.430979][ T5778] device bond0 left promiscuous mode [ 775.436981][ T5778] device bond_slave_0 left promiscuous mode [ 775.446792][ T5778] device bond_slave_1 left promiscuous mode 23:54:56 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x8848000000000000}, 0x0) [ 775.474897][ T5777] affs: Unrecognized mount option ">%@¬" or missing value [ 775.482483][ T5777] affs: Error parsing options 23:54:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000d000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000001180)=[{&(0x7f0000000140)="6767083b19907962dcde88c198b4ef4523d0876584630d9ca32c86795a190d", 0x1f, 0x2}, {&(0x7f0000000180)="5ccd738841f22ed58b762887491cf55ed3416f154232aaff23c6bec6e8ef0d2e6aa63517f1abfa8bc71205d692773962ef127551b1a2e8687c8349af1e674466bf5463b544cfc38d04e6d3637a93ff8a4e3e021443af0a919b63af0eaf2b5d993bf75aa3f7e87602316c72004ab61deb10c6687078ee66e62a502c1349cc22334835bdb34a9bdbff6d232c2011d41edda181a18368c03098f2819a572b3811c0ce283cd0f22d453354222ecd65eb8f11b64a5ceeffdb7799747f7ffe9140093157de99c3155b8d8ca1c10dce8a4256f3851036edb43d30af5f4300491efc43283e3bfb74c3dc102c52ea3dd23caac6b8204a1113fa5e6d18936116b18fe053f8efab78aa5c7dc8cf6d509f31cdb258be8be646bfd223a933d981472ceacc5ff92deb6d5a66659c4ca9babc7d65c369f99f9a1a64304bb9f17bd1c8cfd443945bbd370220530b6ccf00856786a07b88eaeff318dae5802739551b0f7f4b4a596cbad5e702bf6e865b4e18665161a7ec07f45f5987fba708d3df6e6fb0d3fa3574517c689c80c742b0642a3f75f0a204ac0628e409302ae8dd7e6103d8cbb5bfcb3333ba669ce59cec2ee1fd7ad5abf22fa88b1b9dccda50afd636168f13ef426457f99aeeb316b26c265491cfa221b63fa8630904e26d264ed12c5c536c83c307807f76ae467eaeff0f4f4dedb0f7cd59d0246f5590930fc5bdd2046b102581219e8a3927a46bcbe5cf781cf802fff23161e1ac133fdd43ed9eb09613dba6192d60db989feb4b195ca510ef040e7e919f2fdd8c570418b1856b1022c5b87f54e25b7c79a326c800a8379fa1503459a7a2f76164899aad257a23be27a4e7db04e4b8637c59cd1355b2af7ea2599b40a82dad2aeb2a346a6eaa220cdf4e406ed556ad29774a32f633cfe5e54501280d5c2487c6cd1a3f692fbf34aeda5ddd3509c30069dd29d8f4b8edc451c57e6bcb400d093548fd16a777374fddefaca533452e27022e128543dc821c4936604631da532ac06a12dc1afdddbc5268db9bc454ff74661754a0bd6d9472fd4d6d288a6164892203de6f7617a181a9a77926c1b89c820cf56282d6c763e7eb9f6a57a036376bfb7939031b043f654e77ad380c304a0ffaa5c26ecc6ae4afab7f2055319a9f3d97c84ddd1bfa799fa5590d0151a7d0da2b51503315440370a9e35f707f37742c6d90730193e1930a4d5130308851964d700bc006627c93cac3f0f557409a90cafe224f7d76472f34f6aa8c26fb39d5181a85518fd1b61765df8a4512aa6875f1c88ea796ece8afa1adb41a45bc681a5b89e72126ac382f449c347ad86520f8b71844c2a9002d0d08d4d110c8c537fbe3f038076c9c03c550b52e5054923a398e808a2aba8d16bcf08bfa0a5a7ca52bd0925deada1fcb6107fcc7587d9f705a27596f487e889becf576d61923e85594984389a0c40b6345827e247c2419f161279da9c13cd3869e9afd7bb3599a048e3105e92c4fb5882a94f71d19ceef4bd8ae18fe872f951b3b110bffeca418391b1fb3460ecc8c1b09c9ed930a05cfaa77f54a80e2e342da01d57415f384f1a0d5ff669434dfcc79b00c2645533023b9b278fa834b9e494f1a4460d6cb9c706dfa6b639e0d9a97d3ed3f24fbb90bb89a68b3a47289694057222888a543c4678cc4f16a6bb47096951f4e43fee873ec5f607bc01281ce4b265cee6c401b56dd4ad85b337211d6feb3dd8caa2e6c5070f2e525cf1a6c71da4725d230046fbe29e9e86206cbbd20ed5dfba2368d2218b7a02df19dad9c5309de0010e25aa58d866371c40582483c36765f3dbbf442e463f65ecae0419f473b43b322712bcab06948186455af2f051955a3e7d05dc2e433ed2e4e9b18c6464c93457dfcd2b8dd22efbf3ec56c9f459d298e395f792777057dc23d2292b585e32d9db27066baccbd6b2d84eaad03b9aaa6c2ed75de6c94bb290bd1789f9750e40cdeff84d47e5f616ec9ac1dbcf218092efec6c4812bfd3610aa9233b07c29941073939931fc0ab288759405f4a59fae44c7cb0be715c3fbdcb93182de6c47512a9f6c9f742e71c483acd0878019e34bdef01fde61975cf16d14d67d82ef881e2de8d4373654688a460affaa20a93e27f2ac055c751619269fdab0f0ad61aa089cfea95650d3df81d1fcb6d9bfd3488c39239c445d320bad7e1a8a09c82b486a447e330ecbbc071b5eda4f02e8ae3b4a01936850c27f5ceaa3d698ef7f69bd1bd6462fe1dbb83e8a5ebec1ab86f2e511ae9a41445450584e7d1619ae0eea27e0891f040f789c10cc9a1606c6c357c1e828af1bd7ed8bd4bd1f92ca2dabead7404840bf69283806984a5b11baa5ef4dd90fa0d61d9ea36eaa3a1ce1aba5ec883444400ac5b0264436512f5ed8417d08459dda6026a336cbb52a7ec014e7d8e87ab01a3ce0ff6b0763d1db20c5b6bd39c00237c6b1f2a4512a76fba754d31f6333662251f6aafd08c9ebd978758a1d875b0b6d0cd0f0420c02f3f9af72348aea954a1b34aaa0397da6eb91451ba51ef83f27eb42a73fc3c03ee14dbcc95a8d1f6ee82790dc60b4105586da4efc1b9f2afc47d029617b1c2df90184a9696f5a888370d3c36dc081a945d206dc63ada0571a17787cbc04f36fdeb7505c6f48dafcc411be7d9ceae2d6bcbf421c9bf64a219e40c7daf8515c00062b64f648650a93059b4b2146a19df51cd583e77a5cb0032ce32f111d2b0c6bf4c798f72a80eb3ce01e8c9ca8d67bc65d6a79e24e4aea89b1c27d9f84ed272cc2f98f52f18ec76035e2504ac6e16ff436e2ae686d18a1828f3c9d8f1b4d9327306fa254c05d07a1459f02bb9b305205bff423196347eb2892322ce7d321a83419747e0c28f1b4b197ce9e063dcdfaf4957887fea418d4392f5d15261cbf633559601c132388ec6f22de948ab6d6b08843ebb2d53de33ed9fd5f0806f274bca57e6a5d57d1eca3bd58e41c0760b6e3a67404002ec913ad827b2f75303983d9a8482083f68ac457a9f419c1cfcc90e47441db6e291b42906635e8ad03dacef59055d7494be4c73fb4661c74d6a6b558785fe07a67dff6a1559498049ce4c6fd8898f36e7267e41accda731211ecd56997cab389447d1d66fdea7b60d1f1f82fca43748327f03972cb13d1c68d1721fdf4c6d80056154850b089e5fd273852b52c14c9addc1357efe1cacffb06b853542c718b815cf9afabe0b0e5751f593e9efd3fdcd5cfbe50cf1f6dd23df297f966df8648d3564ea6f9f94f712fc5aa7499b01f13389ce67c004ee9499af62687c6c6063580e2c9e1c1ad725aa5467d5b27daff3f9206a85c46724020b1feb1ef7d869157e2d2e2ee73ffc8c5f0edf7a2c3e69a6db3726354fe43cc96641fd072018093d9669e9ba8bc96d1df5b690e905023568f973784a961ff4f5d788a638fdf4b163025466683f13bfc3646d651c3e25279e38ae4d6397f25c5685c715c656f435a9ed0d120073b34e452efcf15e044484e1a0ff88c57192b0fa9f9fcbbd4cfeb8a86901f1e3a5a100bdaabbfde742104202ace48bc20db554bd50744c9d547d20298b02839c45b1cc4fae11831c5bf48f30a83abdde5eb8cff3d821ef6d504fc67b8be2419a9da80e1eb72c1dfbf2528d8169bc4e515062fdca0bcf5a61969cf93cd7ba5b488fe908a87d8b643b9aff736a889403fd182074c74154076cf61e7ce2259f64d9484d9a56c078420592496fa0f640bc496a00bcd66cc2ebaf297585e216c578b378d2da1e1bd80df34a75be0afec89278818df75656a123fbe18940e0864d41bc2825f5f58636aff20345eb67487f6330a414920193ea68c356957567a1154f784bbfa543a9896f5360db764dd955b9677b12f4ea521bc5ffa558523bc442a3b1dbe4f13bdacd4cbb16525c2d4d275e65defc02d80b0527437ec80e59a92ae3f5e7570ee5071ec0ac75edfc5700b180c5391358fd60bcdee9b5c89fb7c4e00c943e2d608600e741725a04870ebe0af5d8c74ed52a87889e2ddb3ec00d96cb10d35c59015d9c8f4485c467e9940aa8ffda369c95f868d910a97e62083b70583efebb233ecc1946f7f15cca0c4a4f218461cb3f2abe25e9f7e8638aadfcd66b2b1be90ef7dfc2c76a353a2b66c96bd53d48b8577763bd7e308a5fbae916091b66be9358a391aabe76d679918d4a10f0d306234c3801056145a7ca6c5b598466ae5a709090f100635484f1c03c40aed74a8f6c78791b8596908f7b6a090ca7c3103530d820faa0e304db01dab14baf4c8d39d1d0ead8c471063abfd7c55e81b39f9d799ebf773560215578966646f7f68e7be833bd84bc2ce51790ab87d96422b20488776887fa521ae32e3aaa40b74db58e36ef17f015dc949e7112acf000afeeab89d80c8fd6756fd04e1d316cf2128d2e88b11651d1e91ca8f2f48164969e35458bf2ec4419fbf56c9e0d92a0663e268db77b1706fe08a458311345982c90bc1209d95dd1ea43e5ea4af11c07a924bc8b8ee6c9039f2d38f0d233584e83c71dbd31c10fe4ff21a9db79d31561aa0d187eef082ff4f5b22b7ce4f683b2d975da1b53bd92f8895776e7f12a1d519a40b0085b3d770db3fc028dfa87a25316278ac362369694e39389db05296507c54a4b91c3282e779bc4eee65452cb3798f0f8a56fc7c6611f747309809b3f0dddf4f433a21b9053519e3387faee0e076c377eda3b9d87571e1b7045f316f9613f1d8a2d178d61ba93b051b03b80767e835b0f9173382af2cd5287bae0cd4ffa176f05cd979cb017850dc8eea85c76ea97d608747587962d7092958286ff5b921627536e68e4f04d00e8d5bb252db5579062d254ab27f117ee4f7b0e6cc811f3a322698360eef3d55a7871b1290afea2d2c9f818e490346582e3a30d68bbc762e783a14449d7c968be0fcb283d720e95b9e90bc3921dd4493bfda37846f130c2d45de7a55a8e7bc8e2713fea629f26f3bcc56c9917531d49c51e314ca961511e284360431ad9aa5413241de985ee3f6e133bf8defa76c9d936129b5877e1acdc286c071bf197d8cbd2551c4d75dbf4b3747c4f74d4330ca0b6b6233548373ebceeb6c6db52b4a90cfdaeaaeba00c1391344f52baf5387802ada88b539aecdc25bb1094d1625e00ef73c38d4782a62bd1adb6fc8f6c5713e587b65331850e937ed11651f0a8230c524a55aa363e1ed8bfb4c82bebe5c16ceaaf1bdc03f5df6e7ca545f10943c31816e482ddec2119b8229391cdf35b7d6eda4aca58bfde5a77f0b56fe870c9fae2165e9f9ca5f1fa106df11cc93d47261bd364b36c5925d01264d3d066b34eb924c241e045e49b9c996d63907fe17ea850560cc85b7adb7ea6c0187940eb7fd056bc770e1f037001afd4e54600a2041ace9975cd0f87ccab5fe97b3baad7d71a6bbf8b519f804f0b94865202876ac994905223493d1d67833d8f042484aaa24b40c0acc9342dccfa8a54d4697a3911e9599c908789b0151503e8db7fe115e323b013c78c8eefb656246516a3b604a928cf1063e6cd1dd2b1b3f9c691fa9eab0caa6583bb4e5e2f8315ffb64ff09d8e2f8a2a6dba9bad4d278007cd3ee53369478c00ab00dc07846c4df1c7a4d764317ec5e5697c4dbeb97103cf81a95f65900b84f3e803a9011c55350fc6cdd46e08601852a8e42213954d8c2685547b321237731ccc4a6e9186eb37a2d7a63511db4fd11301bcfea2acbd803c8fdd13d0c0727daade7e898485da11799a0082258bb445d9902a0b77bf47648758869a4a79cd838ca930e53d09cb3109c27", 0x1000, 0x5}], 0x20000, &(0x7f00000011c0)={[{@overriderock}, {@nocompress}], [{@subj_user={'subj_user', 0x3d, '!%@'}}, {@context={'context', 0x3d, 'system_u'}}, {@measure}]}) 23:54:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000000a000000001000"}) 23:54:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000e000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x88a8ffff00000000}, 0x0) [ 776.002795][ T5808] device bond0 entered promiscuous mode [ 776.008610][ T5808] device bond_slave_0 entered promiscuous mode [ 776.015010][ T5808] device bond_slave_1 entered promiscuous mode [ 776.021722][ T5808] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 776.128055][ T5825] affs: Unrecognized mount option "!%@" or missing value [ 776.135283][ T5825] affs: Error parsing options [ 776.142708][ T5808] device bond0 left promiscuous mode [ 776.148231][ T5808] device bond_slave_0 left promiscuous mode [ 776.154256][ T5808] device bond_slave_1 left promiscuous mode [ 776.187948][ T5825] loop1: detected capacity change from 0 to 8 23:54:57 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x54, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000010000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 23:54:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000002000010000000001000"}) [ 776.275799][ T5825] affs: Unrecognized mount option "!%@" or missing value [ 776.282869][ T5825] affs: Error parsing options 23:54:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r1 = openat2(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x200, 0x20, 0x3}, 0x18) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0xff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000140)='!%@') 23:54:57 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xe502000000000000}, 0x0) 23:54:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000011000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:57 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000003000010000000001000"}) [ 776.815074][ T5859] device bond0 entered promiscuous mode [ 776.822042][ T5859] device bond_slave_0 entered promiscuous mode [ 776.836042][ T5859] device bond_slave_1 entered promiscuous mode [ 776.863884][ T5859] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 776.945952][ T5859] device bond0 left promiscuous mode [ 776.952426][ T5859] device bond_slave_0 left promiscuous mode [ 776.972676][ T5859] device bond_slave_1 left promiscuous mode [ 777.012535][ T5864] affs: Unrecognized mount option "!%@" or missing value [ 777.021850][ T5864] affs: Error parsing options 23:54:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xefffffff00000000}, 0x0) 23:54:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000004000010000000001000"}) [ 777.356681][ T5864] affs: Unrecognized mount option "!%@" or missing value [ 777.363743][ T5864] affs: Error parsing options 23:54:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000012000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:54:58 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x60, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:54:58 executing program 1: ptrace$setopts(0x4206, 0x0, 0x7, 0x100000) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:54:58 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 23:54:58 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005000010000000001000"}) [ 777.800331][ T5910] device bond0 entered promiscuous mode [ 777.806690][ T5910] device bond_slave_0 entered promiscuous mode [ 777.814396][ T5910] device bond_slave_1 entered promiscuous mode [ 777.834307][ T5910] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:54:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000018000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa000000"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 777.875154][ T5907] affs: Unrecognized mount option "!%@" or missing value [ 777.897719][ T5907] affs: Error parsing options 23:54:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000025000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:54:59 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000006000010000000001000"}) [ 778.008470][ T5925] affs: Unrecognized mount option "!%@" or missing value [ 778.015900][ T5925] affs: Error parsing options 23:54:59 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 778.066025][ T5910] device bond0 left promiscuous mode [ 778.072370][ T5910] device bond_slave_0 left promiscuous mode [ 778.087634][ T5910] device bond_slave_1 left promiscuous mode 23:54:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xfeff000000000000}, 0x0) 23:54:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:54:59 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xff0f000000000000}, 0x0) [ 778.479908][ T5910] device bond0 entered promiscuous mode [ 778.485567][ T5910] device bond_slave_0 entered promiscuous mode [ 778.491860][ T5910] device bond_slave_1 entered promiscuous mode [ 778.499375][ T5910] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 778.573091][ T5910] device bond0 left promiscuous mode [ 778.578594][ T5910] device bond_slave_0 left promiscuous mode [ 778.584851][ T5910] device bond_slave_1 left promiscuous mode [ 778.652935][ T5949] affs: Unrecognized mount option "!%@" or missing value [ 778.660539][ T5949] affs: Error parsing options 23:55:00 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x68, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000007000010000000001000"}) 23:55:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000005c000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2, 0x5}}, './file0\x00'}) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0xc6) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x640402, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'ip6_vti0\x00', 0x0, 0x29, 0x3, 0x4, 0x90, 0x41, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x7800, 0x7, 0x7, 0x4}}) r4 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r4, 0x541c, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f0000000300)={0x13, 0xc1, 0x4, 0xfffff001, 0x400, r2, 0x7, '\x00', r3, r4, 0x4, 0x0, 0x4}, 0x40) 23:55:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 23:55:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000008000010000000001000"}) 23:55:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000007a000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:00 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0xffffffff00000000}, 0x0) [ 779.224722][ T5979] affs: Unrecognized mount option "!%@" or missing value [ 779.229490][ T5972] device bond0 entered promiscuous mode [ 779.231777][ T5979] affs: Error parsing options [ 779.242648][ T5972] device bond_slave_0 entered promiscuous mode [ 779.254531][ T5972] device bond_slave_1 entered promiscuous mode [ 779.278211][ T5972] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:00 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 779.338205][ T5979] affs: Unrecognized mount option "!%@" or missing value [ 779.345377][ T5979] affs: Error parsing options 23:55:00 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000009000010000000001000"}) [ 779.411112][ T5972] device bond0 left promiscuous mode [ 779.425028][ T5972] device bond_slave_0 left promiscuous mode [ 779.434247][ T5972] device bond_slave_1 left promiscuous mode [ 779.768894][ T5978] device bond0 entered promiscuous mode [ 779.774717][ T5978] device bond_slave_0 entered promiscuous mode [ 779.781014][ T5978] device bond_slave_1 entered promiscuous mode [ 779.787795][ T5978] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 779.823677][ T5978] device bond0 left promiscuous mode [ 779.829606][ T5978] device bond_slave_0 left promiscuous mode [ 779.836025][ T5978] device bond_slave_1 left promiscuous mode 23:55:01 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6c, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000030010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:01 executing program 1: recvmmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)=[{{&(0x7f0000000140), 0x6e, &(0x7f0000001480)=[{&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/151, 0x97}, {&(0x7f00000012c0)=""/188, 0xbc}, {&(0x7f0000001380)=""/170, 0xaa}, {&(0x7f0000001440)=""/62, 0x3e}], 0x6, &(0x7f0000001640)=ANY=[@ANYBLOB="2c000000000000000100000001000001ca84e088b183ee22f5cc35f776b600", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}}], 0x1, 0x2, &(0x7f0000001600)) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x112, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x100}, 0x0, 0x0, 0x200000, 0x9, 0x20000000000, 0x0, 0x20, 0x0, 0xfffffffc}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="4b20a9c6c09dae0da87c57e32b92585bcd48ce9178164d8b618502f7614e88e72636cec33f93f9d6eaddf3e6bea5219a54877b5ac16479d3629bcfcb3d4ad3be3e5d4a09825471be0091e570e1360f1b9059c823bccd9a135391c1aa20136a9cb6e0842436f99ce276d4b4580791389537c89c90f71beb"]) 23:55:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}}, 0x0) 23:55:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000a000010000000001000"}) 23:55:01 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 780.175716][ T6035] affs: Unrecognized mount option "K ©ÆÀ®¨|Wã+’X[ÍHΑxM‹a…÷aNˆç&6ÎÃ?“ùÖêÝóæ¾¥!šT‡{ZÁdyÓb›ÏË=JÓ¾>]J ‚Tq¾" or missing value [ 780.189153][ T6035] affs: Error parsing options 23:55:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000050010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:01 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x0) 23:55:01 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000b000010000000001000"}) [ 780.364167][ T6042] device bond0 entered promiscuous mode [ 780.370357][ T6042] device bond_slave_0 entered promiscuous mode [ 780.380222][ T6042] device bond_slave_1 entered promiscuous mode [ 780.395986][ T6042] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 780.434389][ T6042] device bond0 left promiscuous mode [ 780.452930][ T6042] device bond_slave_0 left promiscuous mode [ 780.461584][ T6042] device bond_slave_1 left promiscuous mode [ 780.487785][ T6052] affs: Unrecognized mount option "K ©ÆÀ®¨|Wã+’X[ÍHΑxM‹a…÷aNˆç&6ÎÃ?“ùÖêÝóæ¾¥!šT‡{ZÁdyÓb›ÏË=JÓ¾>]J ‚Tq¾" or missing value [ 780.500964][ T6052] affs: Error parsing options 23:55:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000054050010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 780.998550][ T6042] device bond0 entered promiscuous mode [ 781.004184][ T6042] device bond_slave_0 entered promiscuous mode [ 781.010460][ T6042] device bond_slave_1 entered promiscuous mode [ 781.017190][ T6042] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 781.037400][ T6042] device bond0 left promiscuous mode [ 781.042711][ T6042] device bond_slave_0 left promiscuous mode [ 781.048836][ T6042] device bond_slave_1 left promiscuous mode 23:55:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x206, &(0x7f0000000140)={@broadcast, @remote, @void, {@mpls_uc={0x8847, {[{0x7, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x0, 0x0, 0x1}, {}, {0x4d1}, {0x8, 0x0, 0x1}, {0x9}], @ipv6=@udp={0xa, 0x6, "a6c712", 0x1b4, 0x11, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @remote, {[@fragment={0x21, 0x0, 0x2, 0x0, 0x0, 0x9, 0x66}, @srh={0x1d, 0xa, 0x4, 0x5, 0x1, 0x50, 0xffff, [@remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x40}, @private1={0xfc, 0x1, '\x00', 0x1}]}, @routing={0x87, 0x8, 0x0, 0x6, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @loopback}, @private0={0xfc, 0x0, '\x00', 0x1}, @private0]}, @dstopts={0x87, 0x2, '\x00', [@pad1, @padn={0x1, 0x1, [0x0]}, @ra, @enc_lim={0x4, 0x1, 0x8}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}, @routing={0x8cbe47895d742fe5, 0x4, 0x1, 0x3, 0x0, [@loopback, @loopback]}, @fragment={0x1d, 0x0, 0x81, 0x1, 0x0, 0x6, 0x66}, @routing={0x6c, 0x4, 0x3, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @fragment={0x2b, 0x0, 0x5, 0x1, 0x0, 0x3, 0x66}], {0x4e23, 0x4e21, 0x8c, 0x0, @gue={{0x1, 0x0, 0x0, 0x9, 0x0, @void}, "a949e2bb589e9c74897e649a2d790a30ca5284ee3b87d4757a5db1992585dda3c34eb35a35cec608fcfd130958c7c5ba918bb4ab532b595063a66c8686ca1475e7bbb179b755ec45894f35797b3e4dddf3b3557939413830f23b0a3aefeddab665d9a7edea5729384c806ec28767a1c4c1f6860774eb5d7c455438b71649aed0"}}}}}}}}, &(0x7f00000000c0)={0x1, 0x1, [0x8bf, 0x79a, 0xda0, 0x606]}) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='o/(!-}:\x00') 23:55:02 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000c000010000000001000"}) 23:55:02 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3}, 0x0) 23:55:02 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:02 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000060010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000070010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000090010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000d000010000000001000"}) [ 781.674471][ T6086] affs: Unrecognized mount option "!%@" or missing value [ 781.681621][ T6086] affs: Error parsing options 23:55:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 23:55:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000e000010000000001000"}) [ 781.731173][ T6101] device bond0 entered promiscuous mode [ 781.737164][ T6101] device bond_slave_0 entered promiscuous mode [ 781.747126][ T6101] device bond_slave_1 entered promiscuous mode [ 781.764119][ T6101] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 781.851406][ T6097] affs: Unrecognized mount option "!%@" or missing value [ 781.858686][ T6097] affs: Error parsing options [ 781.962228][ T6101] device bond0 left promiscuous mode [ 781.972442][ T6101] device bond_slave_0 left promiscuous mode [ 781.982876][ T6101] device bond_slave_1 left promiscuous mode 23:55:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000a0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 782.387476][ T6101] device bond0 entered promiscuous mode [ 782.393088][ T6101] device bond_slave_0 entered promiscuous mode [ 782.399541][ T6101] device bond_slave_1 entered promiscuous mode [ 782.406364][ T6101] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 782.423875][ T6101] device bond0 left promiscuous mode [ 782.429757][ T6101] device bond_slave_0 left promiscuous mode [ 782.436027][ T6101] device bond_slave_1 left promiscuous mode 23:55:03 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:03 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x0, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:03 executing program 1: mknodat$loop(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="78634ee2cf1bcf66ab6776d326db625f47a040e807028d7ae6e2db8d60f66217e56b50fc6c4ab1a82595682c8b2985e0ed4f3f8df77b3cbfbe1168e8b584f27fa5f5a8ace59f64946941cf766ea1c3ce785a24faf27cd2907391a6b6a9924a7b3f7746e6b8a6199f0dfe01d0a0d1cd83e4a4089ec847e1b457c8157304b3041008077d499bfb7816994b40eedba111ab778c01f776b9c93cd387cd9a02fb8bcc80c8e592e41acbaf87f7361577989d6e6d60be45a2af4a69d32a0268bdf9b4fcf61004934b3314bab95838542b060fcf9cc6110444b7a55951976cd8eb382017f45c5a96ce319dc238c3"]) r2 = gettid() r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000001c0), 0x2080) pwritev(r3, &(0x7f00000015c0)=[{&(0x7f0000000200)}, {&(0x7f0000000240)="5f6f9d6667b69b4389ca2cbc2d4b4b5e0d537e71010e360130b2e5c2b78eb498e639787206b0f7f77aa5a7f4e424aba2917ae98854cf5a200ab0cb8969c10fadc18f937a82ad5f354036e86fdf3a103002a401fec37dfdcf98a07dd7e5ff91126951ffa5221c923afd8fd7c178de51378b83a54baa09e1a2e7b356be8ab4c4601b321a125f8a1e1bae260ea14a8be9135e7aba4b99dd685ef14380cd40e97e9c8507449b47243364876b82f454ee3f0c7f0be43f4107d33c75333692c63072c6e6fb1e6b7a9431b3308227abe6deb1000fa7b329f08f2806e67d3ef75ffc668d300018fad238b02d068dc633b28b328d8f6f47", 0xf3}, {&(0x7f0000000340)="f2aad63b392c710117c6534eb785893a24232d4a730a051843ab5c51964d0c9f15800773a9c469f38564cb1968068039467e84307da267fb836434f3c735063807a24170ed9c63cdab78b594b8eb0a5b6f169ced004922b5c1fb979d25513e49a27d9f1290912ceef105204a28129d9dc07bf3882842de0bbdb9a38f01308d584832d129022c8824", 0x88}, {&(0x7f0000000400)="74904388818959ea7c72810e2f81aa13d47be690c814ded1c09c79927f5b199690b30c87383cfa3087d411d0ba45ebd5aa73", 0x32}, {&(0x7f0000000440)="77a2c22d5880b1fb3887", 0xa}, {&(0x7f0000000480)="187240ce1485b64cbc202cef30dd19d7c6c20b40a9ace7722ec7d691563c843a8a780f4ed1ae3f9ea6837ee89fec63f1e9cdf42fe138047ddc8cceaef49a586fff643c25022ef7d726e8f08322a9af70b82b", 0x52}, {&(0x7f0000000500)="387338b422f14067189f0074d227ec633e01bea8c1cc8546a0864862146b8d8237488dd88823ec1f2adf190787b738b42165ac4269fc2128b5e10ff95abf3a0c23a0b4c6b660a9216b35048c08d98d2b48cbcebedc784dff599fbc2a20d39ef02dd94adfd092a4a4f21c0107e1844fc3d8781de65034c63a911cfde412e2a1930ab606db431edd4239a64ffe93f0fe5514ba307cb3a3af", 0x97}, {&(0x7f00000005c0)="8f768a8508d49bae5eb91062ccaf3cd55095924c44753299efd05e0332c30bfeeefd2254e3b5c7dc74d771e58c0b62f82c3650e026efd0bb89bcbab1eaefd1f6d0d468e16d40152e0cde90021b6da730fe390e0058b64cbbf8d1caccda2dff7e98b00638789a3664899d575bb6691ec81bea4c5df21019601e1e92d3f14f0fccc8f104fb2dd3e07df81da5285ab547b8801b9ac4999410fd7b4063bab17b8f72e8db907a620fef5b921d4381c375776c6798347fe3675796abb9def90b05720282112c1d5a949ff19037b162dc1819c1a53c6367522221ab7bb2db53f7d898b9520840e8279133c51481b4fbad7bce4907073f81f93d810aff2991051a74e05ef78d47366d9e67a44b5c6ba5a8d0a8e6aa2c144a00fc5dc3f03dc5ce1b703e3d06ddeddb7f159e34c578f4061965389b41777eabaecd32395e8206f28fa0e0dedebdff65bef7b06d341c3b15ca80808403580ca5db9ec7ea40dd98d5edf1181aa6b84385a31ae3a43baacc025333d052960bf0d44cfe508321aac9468b9483f58eddf58d079ff88c8fe6f5232a2ed44a56400153ccdc127e247c9c8dc8461939a24e0fc9a6d2988dda080e11af4bd4fe714d17b57c9106c6817b0dc7a46d24e72593d814161bdb8f4acdab1e6124a473775438198099955d99520436a97c9f6123b9a8f0e9896aaf8403d6c87322b8b1c0d9c0789d48f7df087e7ed524625dde4362c77a8e1cde35d0b5893a2686a9e4ebff67d462b669356328d5b9a4016f6410cbffb23b2ed5a8a3c1cf6a720d8c4044e7623d9e588dbc1b16acbb41ab82367f535a203fb8833814a1a1e335c9462fdc72adfdbad2b2e0e9e7bfeb7387170ffb8edd1579774c26a3503f658429c669af390587fad5b4d37599adffc65e31bf4fb85fd38a13dac45a928f5652ee8cb02cdfbe1c7cd75b81484997df13fb24a51ebf226e93e20a1f5cb47eb7fb6f771772b04f6880f28d915fa5d4e83fafca6cae7886904fb3f68f63d8d6c431c2363fd271f0cb25307cfaaedca19c6e70f06d657c5065ec60178e7b3f7a5eecf135207dbe7e4285fa87e6efe8be87430294a08d515423878da38afd4bff424a9bcfc47777e1aae2e5b289efafaf944099882cf5171dc26901a7fa6d148bb1d2bdc315a0743252d45cda515a7f15c6430ac7df4985cf89cfd21ea23dcf12593710f48a3ebfd5535dc0c38262a6a6bb5815283ebd24a81b9b2177fe3c558d68bc1b6ec23b0fd8dd11d73a3d63691f5ad5c267cc469c14849d9909794b6aa0c765fff97336ce640da1bc4c384761841ff632cc6a6d2b447c142c448f9d845e625f938028fd2b64fd0d5bcc4afcf58a6ca914891dcfb536f2836497c83b2ca8281b100261779f4dd28ea036173a2d1f6258b4b8c51dc8fef86b1dbc0be1a300cbca42bb47ad66cf1d42fedf3b0a17cc43a5052ad76e8c8825141d8861eefef96ed3170105eea406d1b48d5424050b12a4af6f83f4584f8cf8c6be75fd579acd10b9e40dff812e309d5cfe5f414c714b342e711fe7cf49651bdc3f0c5e55314789e9fbbc87b809fe6dd1c6b22620bca536bb94ee38ec0539636f3cf69338ebe0cd4101fa133e25f80bd10557da26120e326a2b7f7e8d3bc1140ce77fdeff33d391686103acb3a8dab3dd2b56258ff725e173e73578c790eea3c624f561dae845bae83d62a9dd1b29fe4fc60c2e775d70d2e977a37bb6da40de745a82709b3c5a0e966f7d3956d53d31c837370d61e92c6e874dcf511ad773d7e6686591aac9837151e565e5a4dbe47bcfc69e0554798213c6efe7da06cfd563ff4c1e3bef89cfc8b21c1d9c87bdf40817a1aee707c3e6391d9e84af7d74345684ab1db8fcdcd04367e5af5666481ab12842b923d9f8373c81a951727bd1941cfe738cda80c7d0382663919ca54e8bea166325fc4613b98b8b7d9c49d90c2d85fa7451b07120fef0d28b5965b0cdaf1c4921c5e643e7802067ca2ef02a5ce8620c7900c4efb1c3e0ef2d4120f2bf8d9671e639da5d14fa169c2f404c318331a985fbcd93f4a2515cf2687174389ce44c6389a7570781a49dcf107c1fcd8637c520c7c4498305c62ced5839df8b8fb852b5af97e6d9ba962fd1fd3bc3d56b5adbcad2b0827702b1916e80c106207ee4149433a1acf22fe97aa41e50d311e857f8a814553c89b3dbe2a74617e4056acde3bfcc971b3179f578dc3b3aed52beb0776daf69ea14afec02491ffffc4fcb47c2f6bbc258e51c3e29f820aacc1e644086cee54e9ac7dac3027e3df0ffd94beed61bddaf97f24d0a753e503a00282d73a0079ec514fa40828ca38c828aeedfdde2134e9956bb84c4ad5f557fb1b43cc575dabe1f1d8010f8390574c9af1e5bf944606cba4c363be6f1510f14106958db6ad57d448e0ba59de31159b7f9552ff003703821ee4f99d80cf1e0a05d79720053885a1ddf43e84fe59fca24bb44c69109cb77a2eb5b913730586dd7c61a4da3c43a348e9619ad4cff91d4a9ef6cb01e370621f7407a9de42479a4f989970e21aa3889947c9537e9d1b806c72def3be6a7bfb542cd9af985c45a4ac2cebe4648423d413c33578b888be7597491c290ef78afa4bccbd3401e7350197119d3c2a22d2b5b4c6c21698e8f0e5e054ea703e0104c6deaa3134aed8af16617f7cfafaeee223a199e20c115bc925cedc2be1d368b41b586ccd8e1799f2a273c00ff2236628d310696328cc82b930eace5facfedeeb894e2f815b84c7ae357e74580b278f8b8ed463b1406730c55e3abba5ef542f1cdfb798aa2c5302960ada2900683b5eb78c1e8930e4d89ab984b45502b298e49754e4060c6c409b6afcdbb4e172c289e82cb3c929d1f72265d998ec986a8e314aa730eecab14c4e92ed221db739e5aa432d4b4ebe2cbfad68cea1832267b5b8534dfe19cfd39d4b9e2352694b32600076f84ffc6d26025721d94294d5d7799fdf2d42716eeeebb5a89231d4afc1c6bba4a602734ce85d28cf4121f9197b8d73660cd083f9c0be432ad5e311637fffb8824a2aa7456ee2d94d1094a1c619d926ebaba554a18153af2f8cd4940806e95a33aab9f9a7cc4e4c3be2a238bcb46e52c1d5089ecb271b5c14b3edbca4a3b55bcd3062ea9d3d9bacbb7d457c1916f8893d5678438891e7cb25d8fe3d4e7d295498f930f73cb2452d3b6e3389170e465c9391117a417d2fbe90117fdfa8df09e6908946bc070bffe0f2a797cd9aa1171880a3d1872cd8411c43672aaf8216112b892ef021a9149f7d642e6cc770a64a2cadc53c20485bbd8ebb62d4891a426cee4df51bf24854c1f748306f06b5a452fcc7e116f5b5809907ee0f45b449a003bd332806b41c43aed4d2f321389fb1b5472db41a1a2d1b2aa4b30ee9bb6a0b9630fbff5499e7685dc9d39758c20521ea6bb3e676f446edbb387de94d70963aae0cfaff7eeacd6a0a1224b6d5e0bd070e74548f77773db9a3735dc3043f74e6e7411886abdab554001c31f508d82cd2b4ca229bea941f3c064ac31cecb27713f5dabcdef06a4fa9fdb0f0e4b52a1f21e5dd7ff1660e75544c47dfbf3e438b4a646f3fa40a74a30e0fd8ff8adfdf8ca7adf56fdea8d8179bd39e16712bffd8c22092a7551782c79419166a7e22c09ed6453e0b30b7aa4e0c2735883e576d2fabf4f1a8cc5e6d0520e667037fc7e73bb327044321fb186e88f02cf413e55089882e3b297bba30d7aca30ee176ebee1ec7e15e647416c175588241b1f500e872855c08646902d836ecb8937364920c131fc3f97efa19247d84b3ebfd25f093f475225163f3d2e42a4944ed01b08e23580fca7d2a4d70edc9a92fa2b4669b85b283c2a31a56f2b45f8ad272c47fcc2dbaf25a4d5de91a959b63a73af225167c481c9b47144d332ff30215535b67ceb2dc403ad186622391eba3491d4dc578bd31088c197829eb0dcab390883a71f7eb07f99d36443842c59bbe5a148cdd37748331f36b25d2c94605b3389f0b5bfd3506c15b5df91f989024af5f3eef68bb714db83ade274c37f45c93296293bbc76e6b76089882ba369fea24ef8678834f70b64599c78d99ee02245e69e2d49be18ff19090beeefaf2e70918c8e6760c166e043ff36a7d5495bfe604c5e6602ebc718ebca1f9dda0995b23f46b740647fdbc4e800e01fe8afc51793f8bfc2c5c2ca6485771ea327af98864c35122ec4764c7d36bcd0da531018d21787df295d59f3b4777cae06734611fcf7a3f9581ae2b26395133564ca282f20de93d7ac24ae72b9e22884f2d9b418a1dbe3a833ca8d864ed7a4d35d0f54cf10bf5c56dd423b635b43f7cd098ef9118b77e36ee5b3eb16cd1ef3aa5ccf002f819abca9c1995b55457380c16071076e8821bfe0babf81e64490c9c183cf979e84a126040139492da932385aacf9d4aad58a8daf911c20f42b8dfe5383c9d2ee99dfa0ddf014862cc18643b09a63662059e07ec8064008bba5212333813f68dca7b123f336498cca544496e0eab350ee3bc0d4a5e24c78bec1d83be4ab62c1d9e7c1a6b7ee3ce3f396f75845133f9a35aea796c700011aca62e66929b65fcabd13517d23299d835839fb4ba3181bc0276e5b3ba3fe796be11b093803f496a0ca7fc880da30a13aa4e45fd4aa25065d6f086b1d52a90b2deeb90c073ec42f07f6bc3529b4c43cacc3074b7f7778341d3069a2ba879c46fa978c986e297279ba3f0a399f0fb5e175c6c6f2c3c889ed7859e6bc0d6bcb120120d70e27f10634a4079ea976f59637aaaeab483ee127a609b658b833fae159c51c3d32f3d0dd4ba9b1560e931056b19bd074c460639708f52caa7e80e9abc38cce60e1bcf60ec6f7c77b8d696f7ec5145927bad703c57bc96a269da511eac100a0a6d7f27954ad3295b86e57fde09fc35f762161c4104fcbc07c36b90d402333ee58ef94d11eb220bc7a9545c411be1a1ae46cf25718668d3b4fa0dfe483eb04639b3932f3786177be88bbb9a2a5ea4184cde629d5ddfe2b5209c67fc03faf7dfe8ce53ff493d4cb7503002adf176cd69173302bab6673c88d43f14758793b8829f9c31b59ca884df047f181e3e4f639ae0e0946749cb98bb636ae33f7299894d85bd9272793b11d99387993b9907a84bb02009219caba4c45e28252aabf24bdf986501c9bf17b751975b40e103c1cbd215f35fffd5fd75d35293a7d78c442c768ee676fbd32973877c7662841830619d142e1a31d6715347fe83b6e242effab59e9f17b5ad25d194d0b4ca2a74b33eeaad3de329e7229580720451de81a0194eeed7475e58de33e659f1d14a922c650f5749ca02e3484d2799df95e4b051a7abf3b07a07397804235ed7293162d10b658a731191da6c850b37f5c609cee1ea9025d08cbd5389fd71313af7e6efd22a313f6e42a53332e097a1c9ac82be132363978dd59e20b3131dbdec01471f6fc93c225446633758bafbb4b8395805d50d755b8470c3b0b3d830b7fb7886399643d783830844c2df021250455cc3cc5be693ec80a3f5749d1b1087a0c3616e66ce7c44405c794d00eacdfbc2f3bab5737b34ab9cd5f72761916686ec84a335939088e5bb12ff9aaabf11e33d4d2f4548526f0df69d2a9510b1cd3295e31045cd8ae56a127d3a301db1372063e478301104f2cdcc7af10ea1bdbaf16b3567499b6d108b34dd70ced8210e8e31f06bf6daf95b1d63192aff52c4c4e070668dc101973a179130b66ee61eb69d293847dd72eb15c3099aa6ecbd95e0821d65a413bb17e1f24bfcddb25035f544accbdbe913111fb03", 0x1000}], 0x8, 0x4, 0x10001) ptrace$setopts(0x4206, r2, 0x0, 0x300067) close(r1) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x6, 0xd4, 0x1, 0x0, 0x0, 0x2, 0x12100, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0xe}, 0x1c312, 0xa2d, 0x3, 0x9, 0x5, 0x10000, 0x4af7, 0x0, 0xa8a, 0x0, 0x4}, r2, 0xffffffffffffffff, r0, 0xa) r4 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) ptrace$setopts(0x4200, r2, 0x9, 0x1d) faccessat(r1, &(0x7f0000000100)='./file0\x00', 0x6) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r4, 0x541c, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, &(0x7f0000000200)={{0x3, 0x0, 0xd5d, 0x3, 0x3}}) 23:55:03 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000010000010000000001000"}) 23:55:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000b0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:03 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5}, 0x0) 23:55:04 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000011000010000000001000"}) 23:55:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x0, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 782.779200][ T6157] affs: Unrecognized mount option "xcNâÏÏf«gvÓ&Ûb_G @èzæâÛ`öbåkPülJ±¨%•h" or missing value [ 782.789941][ T6157] affs: Error parsing options [ 782.903046][ T6170] affs: Unrecognized mount option "xcNâÏÏf«gvÓ&Ûb_G @èzæâÛ`öbåkPülJ±¨%•h" or missing value [ 782.913713][ T6170] affs: Error parsing options 23:55:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000c0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:04 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6}, 0x0) [ 783.069755][ T6162] device bond0 entered promiscuous mode [ 783.076173][ T6162] device bond_slave_0 entered promiscuous mode [ 783.088912][ T6162] device bond_slave_1 entered promiscuous mode [ 783.107896][ T6162] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:04 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x0, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 783.166336][ T6162] device bond0 left promiscuous mode [ 783.171729][ T6162] device bond_slave_0 left promiscuous mode [ 783.181658][ T6162] device bond_slave_1 left promiscuous mode 23:55:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) r1 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, 0x0) r2 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) r3 = memfd_secret(0x80000) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000d40)={'wlan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000022c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random}]]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TESTMODE(r3, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3c826fbde4506484}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0x374, 0x0, 0x1, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_TESTDATA={0x32, 0x45, "25b75f97f6349bf2bbd05e9a38ec1c7261126b22d4ecc64093c91e99d5b9c35fa0e9426c79104088738f2a47c838"}, @NL80211_ATTR_TESTDATA={0x92, 0x45, "e747d7c3e46de3dd980fa35d8abd58f7c950cc25611436eaa9c8e07bc8a6bf62d63915c8408408b410d2e2aeb9bc574082ac2a8864b4caf4312a3904b548f2f39c46fc38ce31862c11247ac8bae6f325ac88798417182a5c4dbf19f75ff57302ec7f75f59ef55f63e1067a6733c1a35d8300690d49d1f7ddb6a8e8ff922cb225d05001932eab276543500e5a7404"}, @NL80211_ATTR_TESTDATA={0xfa, 0x45, "93a0f9e326afa88263257cd52f1bdc204bc9c240f442a7d08ca1e75fc350e94e586a799c67027becd6c2621a7fc7cf4008f1679e460933411058a13b383ed878cc7577d73e8e633379e6635e76d244730401c3066179b1bfdf568042a869d591ca73ba85f2b6677219da4974e3d8344110df3419e6fd09dd8730790d21977cbafb25add9896a9dffd61a1df4875dcf1a0def8d1c83ebfd683f0df5867b2b6dff11695cac5913a9742c938f3b79cedf5301a48ef85781a22e1a6c279f9373484027112398c64493210fc5a09416fc5a4210954cb0e42c5f8b89f5f0ae8464ad7942716147e58b9fb76d5d01ba4beaf64d3532318cd739"}, @NL80211_ATTR_TESTDATA={0x4}, @NL80211_ATTR_TESTDATA={0xe3, 0x45, "57caa210be0887b1d66ba01b6cfecd822ac8c0f6e4d7e5b3bebd707a47ff75b853ed59795407b8a5d1164407c959adcc2d24b3afdf424c983b7b12162cd088f5eb2a79c57707484030ce3a4b8209c6a9a2e366b7f036a559c35666f19379040aeceee620a69195477ff1f7405ddc72701adb1361c158ff46d61d6ff1e4b4d126dae7c66728027d248dfce514c2f4c95ada945f9c99c3b636b2142822508aeb6b8ac508a05d5e7baa2fca73426c00c8300231651d734a5d6f00094cb95653e32ceb56314d4a3a6acbfb0fe76a372cad0aeebca86aa11edf67bc6ae4e321bc57"}, @NL80211_ATTR_TESTDATA={0xab, 0x45, "28324857c7e7992deefe4a257119c73a5873c49d846776735b02002763b6113d9919d112344797aaa6127c0c69ef1cd879ee7bd783f31aa08416f8df7888d9ed43cc59b5aa3de66fe6f4d41b35f4d4e087c95b025416ae15122ba5a9e3cc9bae726efebd0bcb14a95b7cb05b2e7a871feb0c9fc6609a594215a9c08dc8920e39545b222ef2724312de43c74be1308ef033337ca64341e18fb647eb0c81de8f4e971a616056e43e"}]}, 0x374}, 0x1, 0x0, 0x0, 0x24008841}, 0x400c041) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000380)) ioctl$SNDRV_PCM_IOCTL_DRAIN(r2, 0x4144, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x1, 0x99, 0x1, 0x6, 0x0, 0x9, 0x80000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000080)}, 0x8, 0x7f6a, 0x5, 0x2, 0xb097, 0x6, 0x0, 0x0, 0x7, 0x0, 0x1286}, r0, 0x9, r1, 0x1) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 783.797474][ T6162] device bond0 entered promiscuous mode [ 783.804053][ T6162] device bond_slave_0 entered promiscuous mode [ 783.808763][ T6198] affs: Unrecognized mount option "!%@" or missing value [ 783.812483][ T6162] device bond_slave_1 entered promiscuous mode [ 783.817937][ T6198] affs: Error parsing options [ 783.842701][ T6162] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 783.889056][ T6162] device bond0 left promiscuous mode [ 783.894561][ T6162] device bond_slave_0 left promiscuous mode [ 783.900574][ T6162] device bond_slave_1 left promiscuous mode 23:55:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000012000010000000001000"}) 23:55:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000d0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:05 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7}, 0x0) 23:55:05 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x83, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:05 executing program 1: r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00042bbd7000fbdbdf25010000000800090000000000080004007f00000108000500e00000020c0003000200000000000000080004007f00000108000400e000000108000100", @ANYRES32=0x0, @ANYBLOB="4293e5c6ceaf7dc330baf858ef734f6169e9167cc34291f144f09a2662ba4ebaad501ef37519716ff4636acac4416b56acde22357a6abff102d68973664f52bd6279df9f3763fd419cf4c82be11e8f31938ae6209c6dc9aef7c04595073d46d81d2b41b7f70eca20bc83d15b6b13e13343e2"], 0x50}}, 0x40000) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r2 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x20000000}}, './file0/file1\x00'}) ioctl$SNDCTL_TMR_TEMPO(r3, 0xc0045405, &(0x7f0000000200)=0x7b) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) 23:55:05 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:05 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000018000010000000001000"}) 23:55:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000e0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 784.510907][ T6229] affs: Unrecognized mount option "!%@" or missing value [ 784.518148][ T6229] affs: Error parsing options 23:55:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8}, 0x0) [ 784.579036][ T6226] device bond0 entered promiscuous mode [ 784.585115][ T6226] device bond_slave_0 entered promiscuous mode [ 784.593909][ T6226] device bond_slave_1 entered promiscuous mode [ 784.613851][ T6226] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 784.642884][ T6226] device bond0 left promiscuous mode [ 784.653613][ T6226] device bond_slave_0 left promiscuous mode [ 784.662701][ T6226] device bond_slave_1 left promiscuous mode 23:55:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000025000010000000001000"}) 23:55:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 784.895417][ T6247] affs: Unrecognized mount option "!%@" or missing value [ 784.902578][ T6247] affs: Error parsing options 23:55:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000df0e0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9}, 0x0) 23:55:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000340)={0x8000, 0x0, {}, {0xee00}, 0x10000, 0x8}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000380)={0x0, 0x1000, {0xffffffffffffffff}, {0xee01}, 0x8fd4, 0x4}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xb9a, 0x2, &(0x7f0000000300)=[{&(0x7f0000000140)="8c59647e080eda1b7104a3a6382f6df02865319d37523a960246f93314298f17f8987688b9a4bc9bccb8518815e892f81ba4f7152b92fd5c7dba747321e21e7177e86168e0714ba47234ea08377a07de726bfcfe3a1edfa6bca9b09b53e3a19c6bbe4b9452669bbf21f6021f0f02e74e628c0f95334e281107e93634acc576dd9aae375ef03a78ad9a34ad93b52fa674ddf9293f76ec735ecadf", 0x9a, 0x3f}, {&(0x7f0000000200)="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", 0xfe, 0x90000000}], 0x100000, &(0x7f00000003c0)={[{@map_off}, {@cruft}], [{@fowner_lt={'fowner<', 0xee00}}, {@uid_lt={'uid<', r0}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@uid_lt={'uid<', r1}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) [ 785.116742][ T6226] device bond0 entered promiscuous mode [ 785.123171][ T6226] device bond_slave_0 entered promiscuous mode [ 785.133370][ T6226] device bond_slave_1 entered promiscuous mode [ 785.151949][ T6226] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000005c000010000000001000"}) [ 785.208591][ T6226] device bond0 left promiscuous mode [ 785.214029][ T6226] device bond_slave_0 left promiscuous mode [ 785.220299][ T6226] device bond_slave_1 left promiscuous mode 23:55:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000110010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:06 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa}, 0x0) 23:55:06 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xab, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:06 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000007a000010000000001000"}) [ 785.487784][ T6283] affs: Unrecognized mount option "!%@" or missing value [ 785.495118][ T6283] affs: Error parsing options 23:55:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000120010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 785.690018][ T6289] device bond0 entered promiscuous mode [ 785.696263][ T6289] device bond_slave_0 entered promiscuous mode [ 785.706002][ T6289] device bond_slave_1 entered promiscuous mode [ 785.725461][ T6289] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) recvmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000140)=""/82, 0x52}, {&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/52, 0x34}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000001500)=""/254, 0xfe}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/227, 0xe3}], 0xa, &(0x7f00000027c0)=""/4096, 0x1000}, 0x120) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ftruncate(r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000080)={{r0}, {@void, @actul_num={@val=0x2b, 0x40, 0x54}}}) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0), 0x4) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='!%@GP']) 23:55:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000030010000000001000"}) [ 785.882459][ T6289] device bond0 left promiscuous mode [ 785.890461][ T6289] device bond_slave_0 left promiscuous mode [ 785.899476][ T6289] device bond_slave_1 left promiscuous mode 23:55:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000180010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) syz_open_pts(r0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, &(0x7f0000000000)={0x25, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:07 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000050010000000001000"}) [ 786.267460][ T6313] affs: Unrecognized mount option "!%@GP" or missing value [ 786.274870][ T6313] affs: Error parsing options 23:55:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000250010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:07 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb}, 0x0) [ 786.409401][ T6289] device bond0 entered promiscuous mode [ 786.415208][ T6289] device bond_slave_0 entered promiscuous mode [ 786.421502][ T6289] device bond_slave_1 entered promiscuous mode [ 786.428353][ T6289] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) [ 786.522064][ T6289] device bond0 left promiscuous mode [ 786.527804][ T6289] device bond_slave_0 left promiscuous mode [ 786.533929][ T6289] device bond_slave_1 left promiscuous mode 23:55:08 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xb5, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="2125404e97"]) 23:55:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000054050010000000001000"}) 23:55:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 23:55:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000400010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc}, 0x0) 23:55:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, 0x0) 23:55:08 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xd}, 0x0) [ 786.974896][ T6366] affs: Unrecognized mount option "!%@N—" or missing value [ 786.982153][ T6366] affs: Error parsing options 23:55:08 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000060010000000001000"}) [ 787.150653][ T6370] device bond0 entered promiscuous mode [ 787.157348][ T6370] device bond_slave_0 entered promiscuous mode [ 787.166960][ T6370] device bond_slave_1 entered promiscuous mode [ 787.188412][ T6370] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005540010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000200)="215ec5df3b8997d2f0a95c9a172816a04e5ad5023c15e3f597362a3f7218ad2abc64e431ebd7aacfd2b66111b8c64f273c0571d1d7b6aed92f2db07a57b995f2a4b992f26ee6e2e784864981fb7213873aa7c77485e72f5e95eba163ebe7f210d375f5aba41e1eac981a04e530f06ce3fb6c1b03fa84944893d933f7347a5e1481abd5c3c1f0458f3099f8efb260a8a6da296346c6ca686105b01dc9abdcb4af628b10badce000a05108e58d69", 0xad}], 0x1, 0x0, 0x0, 0x60}, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x81, 0x1) close(r0) 23:55:08 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 787.405640][ T6370] device bond0 left promiscuous mode [ 787.411697][ T6370] device bond_slave_0 left promiscuous mode [ 787.420818][ T6370] device bond_slave_1 left promiscuous mode [ 787.476737][ T6391] affs: Unrecognized mount option "!%@" or missing value [ 787.484002][ T6391] affs: Error parsing options [ 787.553716][ T6391] affs: Unrecognized mount option "!%@" or missing value [ 787.560780][ T6391] affs: Error parsing options 23:55:09 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xb9, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000070010000000001000"}) 23:55:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000005c0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:09 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fcntl$getflags(r0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:55:09 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe}, 0x0) [ 788.112576][ T6424] affs: Unrecognized mount option "!%@" or missing value [ 788.120009][ T6424] affs: Error parsing options 23:55:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000007a0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000090010000000001000"}) 23:55:09 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x0, 0x8, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) [ 788.228736][ T6425] device bond0 entered promiscuous mode [ 788.235062][ T6425] device bond_slave_0 entered promiscuous mode [ 788.243680][ T6425] device bond_slave_1 entered promiscuous mode [ 788.265214][ T6425] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 788.347249][ T6424] affs: Unrecognized mount option "!%@" or missing value [ 788.354579][ T6424] affs: Error parsing options [ 788.379289][ T6425] device bond0 left promiscuous mode [ 788.388985][ T6425] device bond_slave_0 left promiscuous mode 23:55:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 788.398714][ T6425] device bond_slave_1 left promiscuous mode 23:55:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000edf0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:09 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000a0010000000001000"}) [ 788.604907][ T6464] affs: Unrecognized mount option "!%@" or missing value [ 788.612298][ T6464] affs: Error parsing options [ 788.907887][ T6425] device bond0 entered promiscuous mode [ 788.913583][ T6425] device bond_slave_0 entered promiscuous mode [ 788.919853][ T6425] device bond_slave_1 entered promiscuous mode [ 788.926788][ T6425] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 788.993335][ T6425] device bond0 left promiscuous mode [ 788.998730][ T6425] device bond_slave_0 left promiscuous mode [ 789.005242][ T6425] device bond_slave_1 left promiscuous mode 23:55:10 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xbf, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x0, 0x0, 0xfffffffe, 0x0, "000000001000000000000010000000001000"}) 23:55:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000ff0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000b0010000000001000"}) 23:55:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf}, 0x0) 23:55:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000c0010000000001000"}) 23:55:10 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005412000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:10 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 789.495795][ T6505] device bond0 entered promiscuous mode [ 789.501854][ T6505] device bond_slave_0 entered promiscuous mode [ 789.513062][ T6505] device bond_slave_1 entered promiscuous mode [ 789.531236][ T6505] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 789.589784][ T6505] device bond0 left promiscuous mode [ 789.601917][ T6505] device bond_slave_0 left promiscuous mode [ 789.611575][ T6505] device bond_slave_1 left promiscuous mode 23:55:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000d0010000000001000"}) 23:55:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) recvmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000140)=""/82, 0x52}, {&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/52, 0x34}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000001500)=""/254, 0xfe}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/227, 0xe3}], 0xa, &(0x7f00000027c0)=""/4096, 0x1000}, 0x120) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ftruncate(r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000080)={{r0}, {@void, @actul_num={@val=0x2b, 0x40, 0x54}}}) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0), 0x4) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='!%@GP']) 23:55:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000029000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 790.013632][ T6505] device bond0 entered promiscuous mode [ 790.019230][ T6505] device bond_slave_0 entered promiscuous mode [ 790.025749][ T6505] device bond_slave_1 entered promiscuous mode [ 790.032533][ T6505] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 790.054456][ T6505] device bond0 left promiscuous mode [ 790.059787][ T6505] device bond_slave_0 left promiscuous mode [ 790.066715][ T6505] device bond_slave_1 left promiscuous mode 23:55:11 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xd0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x11}, 0x0) 23:55:11 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000e0010000000001000"}) [ 790.303972][ T6528] affs: Unrecognized mount option "!%@GP" or missing value [ 790.311690][ T6528] affs: Error parsing options 23:55:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000040000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:11 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xbf, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000020010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x12}, 0x0) 23:55:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000df0e0010000000001000"}) [ 790.722429][ T6553] device bond0 entered promiscuous mode [ 790.728689][ T6553] device bond_slave_0 entered promiscuous mode [ 790.737388][ T6553] device bond_slave_1 entered promiscuous mode [ 790.756877][ T6553] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 790.800489][ T6553] device bond0 left promiscuous mode [ 790.806430][ T6553] device bond_slave_0 left promiscuous mode [ 790.815048][ T6553] device bond_slave_1 left promiscuous mode 23:55:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000030010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000110010000000001000"}) 23:55:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) recvmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000140)=""/82, 0x52}, {&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/52, 0x34}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000001500)=""/254, 0xfe}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/227, 0xe3}], 0xa, &(0x7f00000027c0)=""/4096, 0x1000}, 0x120) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ftruncate(r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000080)={{r0}, {@void, @actul_num={@val=0x2b, 0x40, 0x54}}}) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0), 0x4) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='!%@GP']) 23:55:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000040010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 791.226809][ T6553] device bond0 entered promiscuous mode [ 791.232435][ T6553] device bond_slave_0 entered promiscuous mode [ 791.238892][ T6553] device bond_slave_1 entered promiscuous mode [ 791.245840][ T6553] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 791.279970][ T6553] device bond0 left promiscuous mode [ 791.285517][ T6553] device bond_slave_0 left promiscuous mode [ 791.291659][ T6553] device bond_slave_1 left promiscuous mode [ 791.334610][ T6585] affs: Unrecognized mount option "!%@GP" or missing value [ 791.341878][ T6585] affs: Error parsing options 23:55:12 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xe8, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x25}, 0x0) 23:55:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000050010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:12 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000120010000000001000"}) 23:55:12 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xd0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:13 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x60}, 0x0) 23:55:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000060010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000180010000000001000"}) [ 791.822450][ T6604] device bond0 entered promiscuous mode [ 791.828813][ T6604] device bond_slave_0 entered promiscuous mode [ 791.839312][ T6604] device bond_slave_1 entered promiscuous mode [ 791.860382][ T6604] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000070010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 791.975227][ T6604] device bond0 left promiscuous mode [ 791.980857][ T6604] device bond_slave_0 left promiscuous mode [ 791.990484][ T6604] device bond_slave_1 left promiscuous mode 23:55:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000250010000000001000"}) 23:55:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000080010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000400010000000001000"}) [ 792.376604][ T6604] device bond0 entered promiscuous mode [ 792.382230][ T6604] device bond_slave_0 entered promiscuous mode [ 792.388702][ T6604] device bond_slave_1 entered promiscuous mode [ 792.395437][ T6604] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 792.432536][ T6604] device bond0 left promiscuous mode [ 792.438183][ T6604] device bond_slave_0 left promiscuous mode [ 792.444309][ T6604] device bond_slave_1 left promiscuous mode 23:55:13 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xf1, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) recvmsg$kcm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000002700)=[{&(0x7f0000000140)=""/82, 0x52}, {&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/52, 0x34}, {&(0x7f0000000340)=""/177, 0xb1}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000400)=""/112, 0x70}, {&(0x7f0000001500)=""/254, 0xfe}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/227, 0xe3}], 0xa, &(0x7f00000027c0)=""/4096, 0x1000}, 0x120) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ftruncate(r2, 0x3) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) ioctl$BTRFS_IOC_RESIZE(r1, 0x50009403, &(0x7f0000000080)={{r0}, {@void, @actul_num={@val=0x2b, 0x40, 0x54}}}) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0), 0x4) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='!%@GP']) 23:55:13 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x83}, 0x0) 23:55:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000090010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:13 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000005540010000000001000"}) 23:55:14 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x5, 0x3f, 0xfd, 0x0, 0x0, 0xc00, 0x11022, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x972, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x9004, 0x1ff, 0x7ff, 0x8, 0x7, 0xd803, 0xfff9, 0x0, 0x10000, 0x0, 0x101}, 0xffffffffffffffff, 0xf, r0, 0x2) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="cd22fc374426e650485564971b11bfa81cce5995bae621cea3c72e82c4b9c3848a1d12d1eb12368b67e3149a1bfe5533f8e7210a0adb4d0273838df42a641a47b7c206176e9e68ff53ed0df33e97f89d817af948e57143217285e837ed27bac725ea2b90a6968d709b644b7198463ed7d639549c49e0e1978820d698389a460d0a2e4905619af968a13150a006da8f67a2c83ba23eb5344f0c0d24b56b5cbd7f24724bd6ace681931c1a695040be21a434056ff078069dedaf9f5d38edbd017e8863e93c38eba3bffecd6fba6c408101c1a921322edfd744b9e6917a539d3bb19b0d6dcc9666bbe5a08257241b8776fe4bfc00429cf1e624dc64a3cbe9cd0c713aff6edb2ab47543135c0e25f61f68941ef6757b5fb498d5e04b6510b07174f41feb780ad0b3f4fb2c89d9e04aea149c813ac80ae34f3d84bd24fdd824e6c818a880c766497a9e24a08219b94d7959aba7a393ad4c96e13e3faaff6f4255d7b36cb77d6e545d7f1cb5249895f20beb6e9a2df7bc39af16fa49e1be078beace0ca0adb0a026e9a20c1abaffe8d458c3a70ac159a6b7d037eed4f683c65f435dfd0900c40409b8630b01b7a450746a46bcca0279df690bf7c31ad1a7e6e3c25616ab6a9a5d6054dc4fec74809b1ccc20b86cd6e3e0f700722531d985d89dbd65ef"]) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffdffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x200000000011, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r2) r3 = perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x28000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r4, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0x200017ec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r3, 0xd000943e, &(0x7f0000058840)={0x0, 0x0, "4ac8bd01e35f63e74c65fcdc67a9ff1165c37d3c552e2b776cc48610eee35c91a9451b78b6cf44a2dc65544acf15a0a4a3f5069dc0374635ae99c87aadfc1dc0946aa477ebbf07a9ebc43c0e1350cf6a4ef61b832626ee958a3191ffe1c87bfbfd101dd8b4ed3398d35260810919add9e9c4ff097b417fbba8cf112273ade2101e964192eeadf1846fc091422f757466c27920c4f7eb873ff8578a33a7567f9cdc2d830aed6751688b319cc2ff020070c278f484acf8d44267a2829a431a7de68af074af5ea9946c048abfe6eb4a15555fb37184ffbaa30a4853688f9409f6181c20a68f08913e9febc9195bb339baac50c9370323ec5b024e858d7ef1c023a4", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f0000059840)={0x9, [], 0x0, "cba55ef58e9dfc"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f000005a840)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, &(0x7f000005b840)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x20, "eeaebb6dd3d112"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005c840)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000005ca40)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005ccc0)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r5}, {r6, r7}, {r8}], 0x40, "944a99252ba204"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f0000060e00)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x80, "806728c11e2211"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000061e00)={{0x0, 0x5, 0x3, 0x2, 0x1, 0x6, 0x1, 0x6, 0x6, 0x1, 0x4, 0xffff, 0x8, 0x4, 0x6}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000061ec0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000620c0)={0xfffffffffffffffb, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {r9}, {r10, r11}], 0x0, "97f4fe3a790cdd"}) [ 792.708824][ T6658] affs: Unrecognized mount option "!%@GP" or missing value [ 792.716124][ T6658] affs: Error parsing options 23:55:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000005c0010000000001000"}) 23:55:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000a0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 792.786312][ T6668] affs: Unrecognized mount option "Í"ü7D&æPHUd—¿¨ÎY•ºæ!ΣÇ.‚ĹÄŠÑë6‹gãšþU3øç! [ 792.786312][ T6668] [ 792.786312][ T6668] ÛMsƒô*dG·ÂnžhÿSíó>—øzùHåqC!r…è7í'ºÇ%ê+¦–p›dKq˜F>×Ö9TœIàá—ˆ Ö˜8šF [ 792.786312][ T6668] .Iašùh¡1P Úg¢È;¢>µ4O $µk\½$rKÖ¬æ“iP@¾!¤4oðxí¯Ÿ]8í½~ˆcé<8룿þÍoºl@Á©!2.ß×D¹æ‘zS;±" or missing value [ 792.819023][ T6668] affs: Error parsing options 23:55:14 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2e5}, 0x0) [ 792.967551][ T6665] device bond0 entered promiscuous mode [ 792.975040][ T6665] device bond_slave_0 entered promiscuous mode [ 792.985267][ T6665] device bond_slave_1 entered promiscuous mode 23:55:14 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x83, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 793.028348][ T6665] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:14 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000007a0010000000001000"}) 23:55:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000b0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 793.274011][ T6665] device bond0 left promiscuous mode [ 793.280355][ T6665] device bond_slave_0 left promiscuous mode [ 793.288163][ T6665] device bond_slave_1 left promiscuous mode [ 793.389719][ T6668] affs: Unrecognized mount option "Í"ü7D&æPHUd—¿¨ÎY•ºæ!ΣÇ.‚ĹÄŠÑë6‹gãšþU3øç! [ 793.389719][ T6668] [ 793.389719][ T6668] ÛMsƒô*dG·ÂnžhÿSíó>—øzùHåqC!r…è7í'ºÇ%ê+¦–p›dKq˜F>×Ö9TœIàá—ˆ Ö˜8šF [ 793.389719][ T6668] .Iašùh¡1P Úg¢È;¢>µ4O $µk\½$rKÖ¬æ“iP@¾!¤4oðxí¯Ÿ]8í½~ˆcé<8룿þÍoºl@Á©!2.ß×D¹æ‘zS;±" or missing value [ 793.423997][ T6668] affs: Error parsing options [ 793.589689][ T6706] device bond0 entered promiscuous mode [ 793.595759][ T6706] device bond_slave_0 entered promiscuous mode [ 793.602047][ T6706] device bond_slave_1 entered promiscuous mode [ 793.608776][ T6706] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 793.692092][ T6706] device bond0 left promiscuous mode [ 793.697582][ T6706] device bond_slave_0 left promiscuous mode [ 793.703788][ T6706] device bond_slave_1 left promiscuous mode 23:55:15 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xf5, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000edf0010000000001000"}) 23:55:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000c0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:15 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x7a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:15 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x300}, 0x0) 23:55:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3, 0x0, 0x7f, 0x9, 0x0, 0x5, 0xa3620, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1000, 0x1, @perf_bp={&(0x7f0000000080), 0xe}, 0x9004, 0x7, 0x0, 0x3, 0x7fffffff, 0x5, 0x0, 0x0, 0x1, 0x0, 0x4}, r1, 0x8, r0, 0xb) [ 794.018056][ T6736] affs: Unrecognized mount option "!%@" or missing value [ 794.025318][ T6736] affs: Error parsing options 23:55:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000ff0010000000001000"}) 23:55:15 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x500}, 0x0) [ 794.142999][ T6734] device bond0 entered promiscuous mode [ 794.149646][ T6734] device bond_slave_0 entered promiscuous mode [ 794.168309][ T6734] device bond_slave_1 entered promiscuous mode 23:55:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000d0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 794.190640][ T6734] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 794.221378][ T6734] device bond0 left promiscuous mode [ 794.227440][ T6734] device bond_slave_0 left promiscuous mode [ 794.237587][ T6734] device bond_slave_1 left promiscuous mode [ 794.265263][ T6732] affs: Unrecognized mount option "!%@" or missing value [ 794.272326][ T6732] affs: Error parsing options 23:55:15 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)=0x4) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:55:15 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005412000000001000"}) 23:55:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000e0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 794.787610][ T6734] device bond0 entered promiscuous mode [ 794.787900][ T6768] affs: Unrecognized mount option "!%@" or missing value [ 794.793442][ T6734] device bond_slave_0 entered promiscuous mode [ 794.800450][ T6768] affs: Error parsing options [ 794.811425][ T6734] device bond_slave_1 entered promiscuous mode [ 794.818138][ T6734] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 794.832102][ T6734] device bond0 left promiscuous mode [ 794.837617][ T6734] device bond_slave_0 left promiscuous mode [ 794.843714][ T6734] device bond_slave_1 left promiscuous mode 23:55:16 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xf1, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:16 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x108, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000029000000001000"}) 23:55:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x0) 23:55:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000100010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 794.907796][ T6782] affs: Unrecognized mount option "!%@" or missing value [ 794.914976][ T6782] affs: Error parsing options 23:55:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r0 = syz_mount_image$qnx4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x1f, 0x3, &(0x7f00000012c0)=[{&(0x7f0000000140)="965021aa8c3da4a7c6d157ec023ed262a181d5131f5bd8c88bb558dde2432db2cd1718503821c0f942067eaa5675efdce31dd62dda31761f8da95c60e99842f6ac56c091bf657661cd2f055a1ec99a91c7a04a1a699b698a29b7a0102c721bc88c452f87708ee669f11fe673ac871db8182409afd3c830d9640307f26b42bf36150fd318fec7a3d13bf30be7af2c734f7145a68409de37e143f04c774bc158f1d1b3af44d100633eb4ee3cde6fc1df1ee4b208375249f072b426ef763758a49887975ab2004d3c79bc580b37b6a97f35e2c2d9e18960e417", 0xd8, 0xe2b}, {&(0x7f0000000240)="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", 0x1000, 0x8000}, {&(0x7f0000001240)="32ef0dc32e0a4beba2c334e287af67aa58ac425c3497df3ce1d16f2064fd6f792c6af547d3c26856faf2f962db8cefda2ecbe672ece59183183355232af09c6eb9a3d852f39131fd27e7175108dfc2a81c308edc41e73aabc84524662e22377f1b60e4fc2ae9c7399dfd625d7cbfd71e28313c5de221512c71", 0x79, 0x9}], 0x2000c4, &(0x7f00000013c0)=ANY=[@ANYBLOB="dd232c2125402c61666673002c61707072616973fcffffffffffffff6e65723d292c61707072616973652c00783b54277ae3df56bd1eba966d4330edf4e9121b4b9a7e26f7fa46e5f4291c99e5cb2245fb15eb210d5dec66c0910225888a5e503be2f989666369151a7b6dc486398b05ad15e24676d59dbd2b"]) faccessat(r0, &(0x7f0000001380)='./file0\x00', 0x110) 23:55:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x206, &(0x7f0000000140)={@broadcast, @remote, @void, {@mpls_uc={0x8847, {[{0x7, 0x0, 0x1}, {0x1, 0x0, 0x1}, {0x0, 0x0, 0x1}, {}, {0x4d1}, {0x8, 0x0, 0x1}, {0x9}], @ipv6=@udp={0xa, 0x6, "a6c712", 0x1b4, 0x11, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @remote, {[@fragment={0x21, 0x0, 0x2, 0x0, 0x0, 0x9, 0x66}, @srh={0x1d, 0xa, 0x4, 0x5, 0x1, 0x50, 0xffff, [@remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @dev={0xfe, 0x80, '\x00', 0x40}, @private1={0xfc, 0x1, '\x00', 0x1}]}, @routing={0x87, 0x8, 0x0, 0x6, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @ipv4={'\x00', '\xff\xff', @loopback}, @private0={0xfc, 0x0, '\x00', 0x1}, @private0]}, @dstopts={0x87, 0x2, '\x00', [@pad1, @padn={0x1, 0x1, [0x0]}, @ra, @enc_lim={0x4, 0x1, 0x8}, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}, @routing={0x8cbe47895d742fe5, 0x4, 0x1, 0x3, 0x0, [@loopback, @loopback]}, @fragment={0x1d, 0x0, 0x81, 0x1, 0x0, 0x6, 0x66}, @routing={0x6c, 0x4, 0x3, 0x1, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, @fragment={0x2b, 0x0, 0x5, 0x1, 0x0, 0x3, 0x66}], {0x4e23, 0x4e21, 0x8c, 0x0, @gue={{0x1, 0x0, 0x0, 0x9, 0x0, @void}, "a949e2bb589e9c74897e649a2d790a30ca5284ee3b87d4757a5db1992585dda3c34eb35a35cec608fcfd130958c7c5ba918bb4ab532b595063a66c8686ca1475e7bbb179b755ec45894f35797b3e4dddf3b3557939413830f23b0a3aefeddab665d9a7edea5729384c806ec28767a1c4c1f6860774eb5d7c455438b71649aed0"}}}}}}}}, &(0x7f00000000c0)={0x1, 0x1, [0x8bf, 0x79a, 0xda0, 0x606]}) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='o/(!-}:\x00') 23:55:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000110010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:16 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x700}, 0x0) [ 795.180800][ T6805] affs: Unrecognized mount option "!%@" or missing value [ 795.188264][ T6805] affs: Error parsing options [ 795.269244][ T6809] affs: Unrecognized mount option "!%@" or missing value [ 795.276530][ T6809] affs: Error parsing options 23:55:16 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000040000000001000"}) [ 795.350406][ T6803] device bond0 entered promiscuous mode [ 795.356852][ T6803] device bond_slave_0 entered promiscuous mode [ 795.362511][ T6815] loop1: detected capacity change from 0 to 128 [ 795.366494][ T6803] device bond_slave_1 entered promiscuous mode [ 795.403175][ T6803] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 795.430041][ T6815] qnx4: no qnx4 filesystem (no root dir). [ 795.436936][ T6803] device bond0 left promiscuous mode [ 795.442502][ T6803] device bond_slave_0 left promiscuous mode [ 795.451942][ T6803] device bond_slave_1 left promiscuous mode 23:55:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000120010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 795.534112][ T6805] affs: Unrecognized mount option "!%@" or missing value [ 795.541175][ T6805] affs: Error parsing options 23:55:17 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x54, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000020010000000001000"}) [ 796.039553][ T6803] device bond0 entered promiscuous mode [ 796.045235][ T6803] device bond_slave_0 entered promiscuous mode [ 796.051511][ T6803] device bond_slave_1 entered promiscuous mode [ 796.058254][ T6803] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 796.075314][ T6803] device bond0 left promiscuous mode [ 796.080661][ T6803] device bond_slave_0 left promiscuous mode [ 796.087113][ T6803] device bond_slave_1 left promiscuous mode 23:55:17 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x109, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:17 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x1, 0xc, 0x4, 0x4, 0x84e8, {0x0, 0xea60}, {0x4, 0x2, 0x5, 0x1, 0xcf, 0xfb, "cfa734fc"}, 0x6, 0x3, @planes=&(0x7f0000000080)={0x6, 0xf3e8, @fd, 0x4}, 0xec, 0x0, 0xffffffffffffffff}) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:55:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000180010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x900}, 0x0) 23:55:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000030010000000001000"}) 23:55:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000d000010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 796.282635][ T6867] affs: Unrecognized mount option "!%@" or missing value [ 796.289802][ T6867] affs: Error parsing options 23:55:17 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 23:55:17 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x4a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000040010000000001000"}) [ 796.530963][ T6874] device bond0 entered promiscuous mode [ 796.537272][ T6874] device bond_slave_0 entered promiscuous mode [ 796.546512][ T6874] device bond_slave_1 entered promiscuous mode [ 796.563257][ T6874] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 796.611387][ T6874] device bond0 left promiscuous mode 23:55:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000250010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 796.628490][ T6874] device bond_slave_0 left promiscuous mode [ 796.643159][ T6874] device bond_slave_1 left promiscuous mode [ 796.775515][ T6893] affs: Unrecognized mount option "!%@" or missing value [ 796.782691][ T6893] affs: Error parsing options 23:55:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000005c0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000050010000000001000"}) [ 797.067490][ T6874] device bond0 entered promiscuous mode [ 797.073142][ T6874] device bond_slave_0 entered promiscuous mode [ 797.079431][ T6874] device bond_slave_1 entered promiscuous mode [ 797.086524][ T6874] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 797.111869][ T6874] device bond0 left promiscuous mode [ 797.117358][ T6874] device bond_slave_0 left promiscuous mode [ 797.123516][ T6874] device bond_slave_1 left promiscuous mode 23:55:18 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x132, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000007a0010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:55:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb00}, 0x0) 23:55:18 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x48, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000060010000000001000"}) [ 797.360300][ T6932] affs: Unrecognized mount option "!%@" or missing value [ 797.367459][ T6932] affs: Error parsing options 23:55:18 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x41, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:18 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc00}, 0x0) 23:55:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000310000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000070010000000001000"}) 23:55:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x3, 0x0, 0x32, 0x0, 0x2, 0x0, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x400, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0xb9a6b05, 0x0, 0x8, 0x0, 0x6, 0xff81, 0x0, 0xffff9a79, 0x0, 0xac}, 0x0, 0xa, r0, 0x1) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 797.635622][ T6940] device bond0 entered promiscuous mode [ 797.641662][ T6940] device bond_slave_0 entered promiscuous mode [ 797.651151][ T6940] device bond_slave_1 entered promiscuous mode [ 797.672575][ T6940] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 797.839325][ T6940] device bond0 left promiscuous mode [ 797.845298][ T6940] device bond_slave_0 left promiscuous mode [ 797.867302][ T6940] device bond_slave_1 left promiscuous mode [ 798.057498][ T6958] affs: Unrecognized mount option "!%@" or missing value [ 798.064727][ T6958] affs: Error parsing options [ 798.216741][ T6974] affs: Unrecognized mount option "!%@" or missing value [ 798.223905][ T6974] affs: Error parsing options [ 798.256036][ T6940] device bond0 entered promiscuous mode [ 798.261625][ T6940] device bond_slave_0 entered promiscuous mode [ 798.267960][ T6940] device bond_slave_1 entered promiscuous mode [ 798.274571][ T6940] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 798.290785][ T6940] device bond0 left promiscuous mode [ 798.296519][ T6940] device bond_slave_0 left promiscuous mode [ 798.302542][ T6940] device bond_slave_1 left promiscuous mode 23:55:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000540510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:19 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000080010000000001000"}) 23:55:19 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:19 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xd00}, 0x0) 23:55:19 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x144, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:19 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x0, 0x9, 0x7, 0x0, 0x2, 0x24052, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x2003, 0x7, 0x700000, 0x1, 0x3f, 0x0, 0x4, 0x0, 0x2, 0x0, 0xde}, 0x0, 0xb, r0, 0x1) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="a9b8ce0466"]) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="4e06554beb5218e60bf94933c59bffcdd652c3a141c84fc140a3ba697ba97bb57261fad15850f53964b1497e26a5c9712ddb748587d202e48322f7d7153c148947ab91a3214431eae9f8bb71a72efdef5b1c30a7e63534af47e7c5559b0b2d80e957d0becab8b77c636b9590e7edc4de0b7f68637650c6c34e4a36dc2fdf8e123e4da5a7dc7e22e69af3a4bb64562b3dd49d07b5d2e3bcde0e071780947b9a5b6e4232e4ac8bfaddee796b13b7c14a2eb6e66641f733bc15268f1a635f0c24eec85c9ad4f96304701d95e1b98214c80004a99aead1ed8457f93746ff721d2bca472ea714368e14", 0xe7, 0xffffffffffffff00}, {&(0x7f0000000300)="b2f4102842ce57b6f3cc4964a549fe400873a28aa69f3ffc0f9ad8921d55d1dab68d74d3a59ca068f86a8171a3db36de81de26aa49616437ee05b14029180cd646e31ad1fab89700ddb1b6279afc266d81b91af654", 0x55, 0x8000}], 0x722cb1724aff956f, &(0x7f00000003c0)={[{@map_normal}], [{@fsname={'fsname', 0x3d, 'affs\x00'}}, {@fowner_gt={'fowner>', 0xffffffffffffffff}}, {@dont_measure}]}) 23:55:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000090010000000001000"}) [ 798.582274][ T6999] affs: Unrecognized mount option "©¸Îf" or missing value [ 798.589663][ T6999] affs: Error parsing options [ 798.744398][ T7008] affs: Unrecognized mount option "©¸Îf" or missing value [ 798.751635][ T7008] affs: Error parsing options 23:55:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000610000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 798.794073][ T7005] device bond0 entered promiscuous mode [ 798.800396][ T7005] device bond_slave_0 entered promiscuous mode [ 798.809722][ T7005] device bond_slave_1 entered promiscuous mode [ 798.826536][ T7005] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:20 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 798.855259][ T7005] device bond0 left promiscuous mode [ 798.861199][ T7005] device bond_slave_0 left promiscuous mode [ 798.875486][ T7005] device bond_slave_1 left promiscuous mode 23:55:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0625402c00f2175c17021e54d260ca239362b953f240c8e06d98187ef376cac5dd64b42c21be4a637405fa1d"]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0xff, 0x2, 0x3f, 0x62, 0x0, 0x0, 0x8000, 0x5, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, @perf_config_ext={0x8000, 0xfffffffffffffff7}, 0x3000, 0x0, 0x1ff, 0x1, 0x2, 0x9, 0x839e, 0x0, 0x4, 0x0, 0x2}, 0xffffffffffffffff, 0x9, r0, 0xc) r2 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r2, 0x541c, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000380)) r3 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r3, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r3, 0x541c, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0), 0x2000, 0x0) openat$cgroup_ro(r4, &(0x7f0000000440)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000380)) ioctl$VHOST_SET_VRING_ADDR(r3, 0x4028af11, &(0x7f0000000340)={0x0, 0x1, &(0x7f0000000240)=""/15, &(0x7f0000000280)=""/13, &(0x7f00000002c0)=""/118, 0x5000}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x80, 0x6, 0x54, 0x0, 0x92, 0x80, 0xa, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000000c0), 0x9}, 0x3, 0x4d29f4de, 0x1d, 0x2, 0x3fd, 0x1, 0x6, 0x0, 0x81d, 0x0, 0x3}, r1, 0x10, r2, 0x1) r5 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r5, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000480), &(0x7f00000004c0), 0x2, 0x1) 23:55:20 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x132, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:20 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000a0010000000001000"}) 23:55:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000710000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 799.220401][ T7029] affs: Unrecognized mount option "%@" or missing value [ 799.227565][ T7029] affs: Error parsing options [ 799.325258][ T7033] syz-executor.3: vmalloc error: size 4096, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1 [ 799.341833][ T7033] CPU: 1 PID: 7033 Comm: syz-executor.3 Not tainted 5.15.0-syzkaller #0 [ 799.350180][ T7033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 799.360249][ T7033] Call Trace: [ 799.363541][ T7033] [ 799.366482][ T7033] dump_stack_lvl+0x201/0x2d8 [ 799.371183][ T7033] ? show_regs_print_info+0x12/0x12 [ 799.376400][ T7033] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 799.382153][ T7033] warn_alloc+0x221/0x370 [ 799.386506][ T7033] ? zone_watermark_ok_safe+0x280/0x280 [ 799.392091][ T7033] ? alloc_pages_bulk_array_mempolicy+0x5be/0x690 [ 799.398537][ T7033] __vmalloc_node_range+0x7c5/0x960 [ 799.403771][ T7033] ? n_tty_open+0x19/0x150 [ 799.408202][ T7033] vzalloc+0x75/0x80 [ 799.412116][ T7033] ? n_tty_open+0x19/0x150 [ 799.416548][ T7033] n_tty_open+0x19/0x150 [ 799.420811][ T7033] tty_ldisc_setup+0xcf/0x3c0 [ 799.425520][ T7033] tty_init_dev+0x271/0x4c0 [ 799.430057][ T7033] ptmx_open+0xdb/0x2c0 [ 799.434237][ T7033] chrdev_open+0x5fb/0x680 [ 799.438691][ T7033] ? __fsnotify_update_child_dentry_flags+0x2d0/0x2d0 [ 799.445604][ T7033] ? cd_forget+0x160/0x160 [ 799.450043][ T7033] ? hook_file_open+0xed/0x220 [ 799.454823][ T7033] ? tomoyo_file_open+0xe6/0x170 [ 799.459783][ T7033] ? security_file_open+0x458/0x570 [ 799.465001][ T7033] ? cd_forget+0x160/0x160 [ 799.469431][ T7033] do_dentry_open+0x78b/0x1020 [ 799.474228][ T7033] path_openat+0x2896/0x3660 [ 799.478876][ T7033] ? do_filp_open+0x4f0/0x4f0 [ 799.483586][ T7033] ? rcu_read_lock_sched_held+0x89/0x130 [ 799.489243][ T7033] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 799.495257][ T7033] do_filp_open+0x277/0x4f0 [ 799.499786][ T7033] ? vfs_tmpfile+0x230/0x230 [ 799.504394][ T7033] ? alloc_fd+0x5e1/0x680 [ 799.508850][ T7033] ? _raw_spin_unlock+0x24/0x40 [ 799.513717][ T7033] ? alloc_fd+0x5e1/0x680 [ 799.518073][ T7033] do_sys_openat2+0x13b/0x500 [ 799.522774][ T7033] ? do_sys_open+0x220/0x220 [ 799.527387][ T7033] __x64_sys_openat+0x243/0x290 [ 799.532256][ T7033] ? __ia32_sys_open+0x270/0x270 [ 799.537209][ T7033] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 799.543206][ T7033] ? lockdep_hardirqs_on+0x95/0x140 [ 799.548420][ T7033] ? syscall_enter_from_user_mode+0x2e/0x1b0 [ 799.554418][ T7033] do_syscall_64+0x44/0xd0 [ 799.558857][ T7033] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 799.564767][ T7033] RIP: 0033:0x7f6d80a11ae9 [ 799.569199][ T7033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 799.588820][ T7033] RSP: 002b:00007f6d7df87188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 799.597281][ T7033] RAX: ffffffffffffffda RBX: 00007f6d80b24f60 RCX: 00007f6d80a11ae9 [ 799.605266][ T7033] RDX: 2f606557d6081b8a RSI: 0000000020000180 RDI: ffffffffffffff9c [ 799.613250][ T7033] RBP: 00007f6d80a6bf25 R08: 0000000000000000 R09: 0000000000000000 [ 799.621323][ T7033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 799.629310][ T7033] R13: 00007fffc8e32fff R14: 00007f6d7df87300 R15: 0000000000022000 [ 799.637429][ T7033] [ 799.640568][ T7033] Mem-Info: [ 799.643747][ T7033] active_anon:288 inactive_anon:172095 isolated_anon:0 [ 799.643747][ T7033] active_file:6126 inactive_file:133269 isolated_file:0 [ 799.643747][ T7033] unevictable:768 dirty:1749 writeback:0 [ 799.643747][ T7033] slab_reclaimable:22232 slab_unreclaimable:97069 [ 799.643747][ T7033] mapped:60946 shmem:6187 pagetables:1947 bounce:0 [ 799.643747][ T7033] kernel_misc_reclaimable:0 [ 799.643747][ T7033] free:1134038 free_pcp:9304 free_cma:0 [ 799.685798][ T7033] Node 0 active_anon:1152kB inactive_anon:685608kB active_file:24384kB inactive_file:533084kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:243788kB dirty:7000kB writeback:0kB shmem:22484kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 305152kB writeback_tmp:0kB kernel_stack:9480kB pagetables:7828kB all_unreclaimable? no [ 799.717610][ T7033] Node 1 active_anon:0kB inactive_anon:728kB active_file:120kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:2264kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 799.746620][ T7033] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 23:55:21 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2f, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 799.776588][ T7033] lowmem_reserve[]: 0 2635 2636 2636 2636 [ 799.782376][ T7033] Node 0 DMA32 free:571500kB boost:0kB min:35588kB low:44484kB high:53380kB reserved_highatomic:0KB active_anon:1152kB inactive_anon:685608kB active_file:24384kB inactive_file:533484kB unevictable:1536kB writepending:7400kB present:3129332kB managed:2705692kB mlocked:0kB bounce:0kB free_pcp:38360kB local_pcp:17712kB free_cma:0kB [ 799.813397][ T7033] lowmem_reserve[]: 0 0 1 1 1 [ 799.818139][ T7033] Node 0 Normal free:0kB boost:0kB min:16kB low:20kB high:24kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1424kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 799.844975][ T7033] lowmem_reserve[]: 0 0 0 0 0 23:55:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf00}, 0x0) [ 799.849712][ T7033] Node 1 Normal free:3947644kB boost:0kB min:54300kB low:67872kB high:81444kB reserved_highatomic:0KB active_anon:0kB inactive_anon:728kB active_file:120kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:1504kB local_pcp:320kB free_cma:0kB [ 799.879168][ T7033] lowmem_reserve[]: 0 0 0 0 0 [ 799.883966][ T7033] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 799.896698][ T7033] Node 0 DMA32: 1088*4kB (UE) 240*8kB (UE) 65*16kB (UME) 650*32kB (UME) 193*64kB (UME) 63*128kB (UME) 21*256kB (UM) 20*512kB (M) 21*1024kB (UME) 1*2048kB (U) 118*4096kB (UM) = 571024kB [ 799.915179][ T7033] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 799.926742][ T7033] Node 1 Normal: 151*4kB (UME) 38*8kB (UME) 29*16kB (UME) 177*32kB (UME) 76*64kB (UME) 24*128kB (UE) 8*256kB (UME) 1*512kB (U) 2*1024kB (UE) 0*2048kB 959*4096kB (M) = 3947644kB [ 799.944474][ T7033] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 799.954079][ T7033] Node 0 hugepages_total=2 hugepages_free=1 hugepages_surp=0 hugepages_size=2048kB [ 799.963426][ T7033] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 799.973042][ T7033] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 799.982329][ T7033] 54581 total pagecache pages [ 799.987060][ T7033] 0 pages in swap cache [ 799.991214][ T7033] Swap cache stats: add 0, delete 0, find 0/0 [ 799.997326][ T7033] Free swap = 0kB [ 800.001044][ T7033] Total swap = 0kB [ 800.004805][ T7033] 2097051 pages RAM [ 800.008606][ T7033] 0 pages HighMem/MovableOnly [ 800.013314][ T7033] 387027 pages reserved [ 800.017476][ T7033] 0 pages cma reserved [ 800.045815][ T7057] affs: Unrecognized mount option "%@" or missing value [ 800.053476][ T7057] affs: Error parsing options 23:55:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000b0010000000001000"}) [ 800.113045][ T7033] ptm ptm0: ldisc open failed (-12), clearing slot 0 [ 800.121261][ T7005] device bond0 entered promiscuous mode [ 800.127175][ T7005] device bond_slave_0 entered promiscuous mode [ 800.133649][ T7005] device bond_slave_1 entered promiscuous mode [ 800.140280][ T7005] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 800.227046][ T7005] device bond0 left promiscuous mode [ 800.232414][ T7005] device bond_slave_0 left promiscuous mode [ 800.238882][ T7005] device bond_slave_1 left promiscuous mode 23:55:21 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1100}, 0x0) 23:55:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000910000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:21 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2a, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:21 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x185, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000c0010000000001000"}) 23:55:21 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x25, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0xb, 0x800, 0x8, 0x0, 0x1}, 0x3c) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001180)={r1, &(0x7f0000003480), &(0x7f00000011c0)=""/4091}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001140)={r1, &(0x7f0000000040), &(0x7f0000000080)=""/4096}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x80, 0x8, 0x40, 0x40, 0x1f, 0x0, 0x9, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xffff, 0x0, @perf_bp={&(0x7f0000000080), 0x6}, 0x0, 0xff, 0x1, 0x8, 0x8, 0x2d, 0x7ff, 0x0, 0x5, 0x0, 0x401}) 23:55:22 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1200}, 0x0) [ 800.746693][ T7089] device bond0 entered promiscuous mode [ 800.753331][ T7089] device bond_slave_0 entered promiscuous mode [ 800.762799][ T7089] device bond_slave_1 entered promiscuous mode [ 800.781932][ T7089] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000a10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000d0010000000001000"}) [ 800.849564][ T7089] device bond0 left promiscuous mode [ 800.862864][ T7089] device bond_slave_0 left promiscuous mode [ 800.873972][ T7089] device bond_slave_1 left promiscuous mode 23:55:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000e0010000000001000"}) [ 801.052868][ T7108] affs: Unrecognized mount option "!%@" or missing value [ 801.060196][ T7108] affs: Error parsing options 23:55:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000b10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 801.215749][ T7116] affs: Unrecognized mount option "!%@" or missing value [ 801.223123][ T7116] affs: Error parsing options 23:55:22 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x21, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:22 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000100010000000001000"}) 23:55:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="213305eb00"]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0xd9, 0x7b, 0x1, 0x6, 0x0, 0x4fca, 0x4408, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7ff, 0x2, @perf_config_ext={0x4, 0x3ff}, 0x8010, 0x7a, 0x2, 0x2, 0x1, 0x2, 0xd0, 0x0, 0x3, 0x0, 0x5}, r0, 0x3, r1, 0x3) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x7, 0x2, 0x20, 0x0, 0x17d, 0x4000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xddf, 0x2, @perf_config_ext={0xdea, 0x7fffffff}, 0x40008, 0x7ff, 0xcaf, 0x7, 0x10001, 0x0, 0x1000, 0x0, 0x3, 0x0, 0xffffffffffff42ba}, 0x0, 0x8, 0xffffffffffffffff, 0x1) [ 801.512920][ T7089] device bond0 entered promiscuous mode [ 801.518742][ T7089] device bond_slave_0 entered promiscuous mode [ 801.528989][ T7089] device bond_slave_1 entered promiscuous mode [ 801.545970][ T7089] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 801.641947][ T7144] affs: Unrecognized mount option "!3ë" or missing value [ 801.649864][ T7144] affs: Error parsing options [ 801.660330][ T7089] device bond0 left promiscuous mode [ 801.666192][ T7089] device bond_slave_0 left promiscuous mode [ 801.672245][ T7089] device bond_slave_1 left promiscuous mode 23:55:23 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x197, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000c10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:23 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2500}, 0x0) 23:55:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000110010000000001000"}) 23:55:23 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xe, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:23 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'ip_vti0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) pread64(r0, &(0x7f0000000140)=""/246, 0xf6, 0x3) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) recvmsg$kcm(r1, &(0x7f00000006c0)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @empty}}, 0x80, &(0x7f00000005c0)=[{&(0x7f00000002c0)=""/129, 0x81}, {&(0x7f0000000380)=""/236, 0xec}, {&(0x7f00000000c0)=""/7, 0x7}, {&(0x7f0000000480)=""/5, 0x5}, {&(0x7f0000000500)=""/172, 0xac}], 0x5, &(0x7f0000000640)=""/76, 0x4c}, 0x10120) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 802.175025][ T7174] device bond0 entered promiscuous mode [ 802.182142][ T7174] device bond_slave_0 entered promiscuous mode [ 802.195185][ T7174] device bond_slave_1 entered promiscuous mode 23:55:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000120010000000001000"}) [ 802.222583][ T7174] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000d10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 802.357079][ T7177] affs: Unrecognized mount option "!%@" or missing value [ 802.365093][ T7177] affs: Error parsing options 23:55:23 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000180010000000001000"}) [ 802.444578][ T7174] device bond0 left promiscuous mode [ 802.450348][ T7174] device bond_slave_0 left promiscuous mode [ 802.487373][ T7174] device bond_slave_1 left promiscuous mode 23:55:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000e10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 802.532109][ T7194] affs: Unrecognized mount option "!%@" or missing value [ 802.539546][ T7194] affs: Error parsing options 23:55:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) syz_mount_image$squashfs(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x8, &(0x7f00000005c0)=[{&(0x7f0000000140)="7a674093166aa9fef44016c2d3ed464e71cf31a6f82f4c7a8cea7b212d0e8e58adc2efdfcb83579ca5fd085c7a1bb9164087a583a6a6b4599a982d187550bfc57707c13b4d8ccf45bf1c5673746574ca8e87d89d482672976453cf43dceab8f8a0d0dec5ca62c4b3c2200a697396fadadf4aead48e40fd3b1c9bee77551fcc902427c7eee87c9c34ef48b27676574fbb9cce9c708b5d3fc81402", 0x9a, 0xa09}, {&(0x7f0000000200)="2deb4a0197b985dec1b1708c9f062da7eddcbeb4faeef879803c12f775d97446323d25815dfff568a1764dcf94fd166f49ab4bb58d9ebedd0e6e", 0x3a, 0xea}, {&(0x7f0000000240)="33270dc09c2ce0eab13498a7b209cae4561e95eec1226ce83a4baa781839f0228cd17758a5fe7678eab6a5451071f363ca24fb70df0d6688e768a8b70fdef2a1354d1374df6d352fa4a9d16c26e11cd9d8138ba7a4bc4a8c5be454740d91c1a8277fa474ea0848eb3081eb304017bdfe066246953cf89fce1ee017b618720dad5707a0089eb634e6da21fefce1517c0d50691bc98bf35045f7bcbea08ed1b82699caf2740998e2502f61549ebbd37cb90cf8b8e45463bdfd8affe5df785f3ed10cbc327b68f9", 0xc6, 0x7}, {&(0x7f0000000340)="cc1c994ef967a53163f1f5c75abe8bd875d4776c12daa56909bcdaa8f4c8946d72f1ff1b8101359ded68bd49018dc008adfc708231b772a08e9e234acc584c883d0f7131fffb3f2ecf1d17aea77a7d57637b8b", 0x53, 0x5}, {&(0x7f00000003c0)="4900bc5b9767715c5f31a34d2767289d7000f806b5d1b023afcb5af17c707efa78bdeeaf62bdc1e59fab686a60911cc8f3e41c4c65af8a091ea8af7557664f4855ea4c36b2cf6206f70336a859f08ceee26697c1", 0x54, 0x76218244}, {&(0x7f0000000440)="3fed3fed11beaf48bf873a4182c136ad458d949c10dec865a819b24e717843a7ac66867e6241473485", 0x29, 0x8}, {&(0x7f0000000480)="58a7c736238fec48a2c178284e2b58b9d7888c11d882279fd2d535608c755752b21f58e436245ab691cf5c6f03d019c85dccd51145921919720f94070051fb88d54cffcfbbb77dea0f25ef633477abf53c2459189dfd4b65ecc4", 0x5a, 0x3}, {&(0x7f0000000500)="0daf937a74881009ea85d900e03fa9b7b4d5226b34222f853ef0124176834cbfda30a1caa597debc3098b5c9dd756d05fe0f75fe7cfcd83c6919cf8bde5245a8c933c5864a8719c6b929078c720679287dc3ff6f7a6f603d3e9d3779d23883a094c44fecc08492c87b8f4d576705d8990cddd2f03a0e8ce1eeb75816cfb22656e8a4209ca1e9f4d54db6622f6bdce937650937bfe43f802d3df515348e33084bdaf370d209dcad9265a6e31332468829b26763a7", 0xb4, 0x2}], 0x808800, &(0x7f0000000680)={[{'i'}, {'affs\x00'}, {'!%@'}, {'('}], [{@dont_hash}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@obj_user={'obj_user', 0x3d, '&'}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}]}) 23:55:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000250010000000001000"}) 23:55:24 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x1f9, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:24 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x185, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000df0e10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4788}, 0x0) 23:55:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000005c0010000000001000"}) [ 803.034271][ T7211] affs: Unrecognized mount option "!%@" or missing value [ 803.041672][ T7211] affs: Error parsing options 23:55:24 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x197, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 803.123002][ T7211] affs: Unrecognized mount option "!%@" or missing value [ 803.130066][ T7211] affs: Error parsing options 23:55:24 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000880), 0x8002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000940)={&(0x7f0000000900)=@ipv6_getroute={0x24, 0x1a, 0x2, 0x70bd2c, 0x25dfdbfc, {0xa, 0x80, 0x20, 0x6, 0x0, 0x4, 0xc8, 0x8, 0x800}, [@RTA_ENCAP_TYPE={0x6, 0x15, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x4840}, 0xc000) listen(0xffffffffffffffff, 0xffffffe1) syz_emit_ethernet(0xd1, &(0x7f0000000740)={@random="1ea67933ce23", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @void, {@generic={0x9200, "f4263e62b0353455d9eb0e1c56b6a9a45da6fb135debe0a2053f9e565c64810fb1b2770b889a4c056d9d6fabd270c2f838bc17fff51a20bb001f08c568f14e05cf666823b3ca47de1de44339932b39e5e52438ef811625a482dd4ad64180df4693c2a30da2deff6afe0bd77aab4e7bab4035d3f7db1b95cfccef3fd6a043fbe97c805ab807d182683fbe6b7562d5fdec4bbd91a4cfc0498125a2ee88cd9ffb8a2e8204c67ab3257c25a6ad58ea99865245f46c42c67ca02aab5b7f928bd38619276d0f"}}}, &(0x7f0000000840)={0x0, 0x1, [0x6f7, 0xff5, 0x5d3, 0x7f8]}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000100)=""/161, 0xa1}, {&(0x7f00000001c0)=""/83, 0x53}, {&(0x7f0000000240)=""/60, 0x3c}, {&(0x7f0000000280)=""/57, 0x39}, {&(0x7f00000002c0)=""/154, 0x9a}, {&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000440)=""/174, 0xae}], 0x7, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x180}, 0x120) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, r1, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x1040000, &(0x7f0000000080)=ANY=[]) 23:55:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001110000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:24 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000007a0010000000001000"}) [ 803.377307][ T7231] device bond0 entered promiscuous mode [ 803.383483][ T7231] device bond_slave_0 entered promiscuous mode [ 803.392676][ T7231] device bond_slave_1 entered promiscuous mode [ 803.412576][ T7231] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:24 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4888}, 0x0) [ 803.459021][ T7231] device bond0 left promiscuous mode [ 803.466325][ T7231] device bond_slave_0 left promiscuous mode [ 803.476404][ T7231] device bond_slave_1 left promiscuous mode 23:55:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001210000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000310000000001000"}) [ 804.105414][ T7231] device bond0 entered promiscuous mode [ 804.111015][ T7231] device bond_slave_0 entered promiscuous mode [ 804.117420][ T7231] device bond_slave_1 entered promiscuous mode [ 804.124205][ T7231] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 804.149457][ T7231] device bond0 left promiscuous mode [ 804.154909][ T7231] device bond_slave_0 left promiscuous mode [ 804.160938][ T7231] device bond_slave_1 left promiscuous mode 23:55:25 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x238, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001810000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5865}, 0x0) 23:55:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000510000000001000"}) 23:55:25 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xd, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:25 executing program 1: r0 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x3) r1 = syz_mount_image$pvfs2(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x7fffffff, 0x4, &(0x7f0000000340)=[{&(0x7f0000000180)="6d717e2112e6bb43136d85324a17a15de45da06dc626509afd69d5d3666ddca6290af7073fee02908b90bdc70aeb8a6e3ab1fe115ba9f1b1d60313c83ccc812186620699296bc6c22063ad40db772f652689b13fbc73edfb47c9b30df9b92d8a285d7af36265f2f9febc2a30", 0x6c, 0x7}, {&(0x7f0000000200)="7c40ee8592bacd6d53c41493478239e0d94ff26d985104ef602b51beb207663515b411578bb5ec7a0573bcbe64fda63f2c24508e3c4c2e4f4630", 0x3a, 0x30836b04}, {&(0x7f0000000240)="6ac1cf888ff7721a40771608ad95412442849df8edbf17145b97beaadebaad205deede33ff0bce2c4e6c36a266fec31fee123d5c576c68e9f0421d36f999e5f31a2d0337b19390ac21583a4652142bab8d9397de0e5ac5d0013c3d6e60e986ff3ffdea058d031f73df4c9d5fd93b892698e9b493650a3d9cefaa309af5c7bca18c15bf3fccd1663e93b7", 0x8a, 0x5}, {&(0x7f0000000300)="294808347f93fdc2b00e6218bbf79948398b1b50633bcb3f889a7c3e243ecddc8c7380ccebbd765c2432f0d98529270ec3e27f437ad51b5c", 0x38, 0x4}], 0x860880, &(0x7f00000004c0)=ANY=[@ANYBLOB="4d2825212a21257b2c2a5d2f232b2c2626252c2125402c2125402c61666673002c726f6e74636f6e746578743d73797374656d5f752c61707072616973655f747970653d696d617369672c736d61636b66226e4deeef3ded0e2c2c666f776e65723e", @ANYRESDEC=0xee00, @ANYBLOB=',fsname=-\x00,fsname=\\,\x00']) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') faccessat(r1, &(0x7f0000000480)='./file0\x00', 0x20) [ 804.428563][ T7297] affs: Unrecognized mount option "!%@" or missing value [ 804.435782][ T7297] affs: Error parsing options 23:55:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000002510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:25 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 23:55:25 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xc, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:25 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000540510000000001000"}) [ 804.642548][ T7301] device bond0 entered promiscuous mode [ 804.648832][ T7301] device bond_slave_0 entered promiscuous mode [ 804.660115][ T7301] device bond_slave_1 entered promiscuous mode [ 804.682238][ T7301] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 804.716916][ T7301] device bond0 left promiscuous mode [ 804.720041][ T7297] affs: Unrecognized mount option "!%@" or missing value [ 804.723192][ T7301] device bond_slave_0 left promiscuous mode [ 804.729865][ T7297] affs: Error parsing options [ 804.743825][ T7301] device bond_slave_1 left promiscuous mode [ 804.795668][ T7303] loop1: detected capacity change from 0 to 264192 23:55:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000610000000001000"}) 23:55:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000004010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 805.253612][ T7301] device bond0 entered promiscuous mode [ 805.259203][ T7301] device bond_slave_0 entered promiscuous mode [ 805.265917][ T7301] device bond_slave_1 entered promiscuous mode [ 805.272698][ T7301] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 805.291107][ T7301] device bond0 left promiscuous mode [ 805.296728][ T7301] device bond_slave_0 left promiscuous mode [ 805.302828][ T7301] device bond_slave_1 left promiscuous mode 23:55:26 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x23d, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:26 executing program 1: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) ftruncate(r0, 0x2) 23:55:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000055410000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:26 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0xb, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:26 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000710000000001000"}) 23:55:26 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6558}, 0x0) 23:55:27 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x9, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 805.646572][ T7359] affs: Unrecognized mount option "!%@" or missing value [ 805.653702][ T7359] affs: Error parsing options 23:55:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8100}, 0x0) 23:55:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000910000000001000"}) 23:55:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005c10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 805.780923][ T7362] device bond0 entered promiscuous mode [ 805.787132][ T7362] device bond_slave_0 entered promiscuous mode [ 805.795812][ T7362] device bond_slave_1 entered promiscuous mode [ 805.815305][ T7362] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 805.857727][ T7362] device bond0 left promiscuous mode [ 805.864067][ T7362] device bond_slave_0 left promiscuous mode [ 805.875313][ T7362] device bond_slave_1 left promiscuous mode [ 805.890405][ T7368] affs: Unrecognized mount option "!%@" or missing value [ 805.897722][ T7368] affs: Error parsing options 23:55:27 executing program 1: r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) sendmsg$NFT_BATCH(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x1c, 0x9, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_SET_DATA_TYPE={0x8}]}, @NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x401, 0x0, 0x0, {0x2, 0x0, 0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWOBJ={0x20, 0x12, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x4}, @NFT_OBJECT_LIMIT=@NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}}, @NFT_MSG_NEWFLOWTABLE={0x110, 0x16, 0xa, 0x201, 0x0, 0x0, {0x5}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8}, @NFTA_FLOWTABLE_HOOK={0xa4, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x17}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_DEVS={0x2c, 0x3, 0x0, 0x1, [{0x14, 0x1, 'bridge_slave_0\x00'}, {0x14, 0x1, 'veth0_to_bond\x00'}]}, @NFTA_FLOWTABLE_HOOK_DEVS={0x54, 0x3, 0x0, 0x1, [{0x14, 0x1, 'sit0\x00'}, {0x14, 0x1, 'netpci0\x00'}, {0x14, 0x1, 'macsec0\x00'}, {0x14, 0x1, 'veth0_macvtap\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x20}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HOOK={0x14, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x800}]}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}]}], {0x14}}, 0x194}, 0x1, 0x0, 0x0, 0x40000}, 0x811) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="216e410104000091e780e921"]) 23:55:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000a10000000001000"}) [ 806.264522][ T7396] affs: Unrecognized mount option "!nA" or missing value [ 806.271863][ T7396] affs: Error parsing options [ 806.394156][ T7407] affs: Unrecognized mount option "!nA" or missing value [ 806.401400][ T7407] affs: Error parsing options [ 806.452132][ T7362] device bond0 entered promiscuous mode [ 806.458025][ T7362] device bond_slave_0 entered promiscuous mode [ 806.464380][ T7362] device bond_slave_1 entered promiscuous mode [ 806.471064][ T7362] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 806.480740][ T7362] device bond0 left promiscuous mode [ 806.486184][ T7362] device bond_slave_0 left promiscuous mode [ 806.492202][ T7362] device bond_slave_1 left promiscuous mode 23:55:27 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x283, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000007a10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:27 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8300}, 0x0) 23:55:27 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:27 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000b10000000001000"}) 23:55:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) syz_mount_image$gfs2(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x9, 0x9, &(0x7f00000007c0)=[{&(0x7f0000000140)="d6cf4292867065595ba1718e0b8c63b7569c1c9d66a086b2eb16cd3555436e3aa5f6afe9733a7f95906cc35d57ad01e627cbc05eaa3a9f8024fa010c2a3e8e8b1fbdf9f975185b4c4fde26515f4456a67fbb4910aa3e1361283826c65a0776a32ced8e2f5399267e4adef65e5efe9fbbd7ea2fc965af02dd1c076cb93aff503e9133ff82dfb903d77cb617a058788c5b62a382d5f0ecb7ef5797cf42c6c29a8b4185151ca74cedbe7e7c0b9ae5b1", 0xae, 0x5}, {&(0x7f0000000200)="0c26728d3e08acd662c09f744fffd82b2a4f1620d78da2a0b46155489306e4f47c0719a2a7a0a25638c734", 0x2b, 0x10001}, {&(0x7f0000000240)="7d3ded1f967774bef23d39141bd1a960a9d186acf3752e4afd96d7d4469e9c7cd0f6537811ea61b669781893d1526ea70338a8b02e5453d3b3fd4c489c6aec965b5293e87cf03e4c2340a6ac817f7951c633f9ed4d8097e867be6b05e04bb1e8cf37914fdd6caaae158e9f98e81a8906e894bf7b2de225a730154c71e81b2d4fbefb0d48dc01f1631e369dab5b", 0x8d, 0x2}, {&(0x7f0000000300)="e2008961d2d56b75", 0x8}, {&(0x7f0000000340)="2a1d0e7d2ad699af06aeb726fd0a82f22a3509819f9253ae877571a93a2f8105ea80404339365de2d861e8439f09acf115ae4bd95280debfc1ac53689cd5682199f8a238557cba2237ac833eccf7e063cb148c7ca4f28a1bfade8a46853d58f370f584a97e5f08cbab10dad09a8f060c06d7a01055e7512d978ee746f2c5d772ac9f3750b849dbe8dcdb1b7d40f5b69dba5b6ee1118569d9cd1e4919ec65009e0d89742363f1318867986da8cfc46b913072ccb8eba3ef1b61cd2d5a43b9fda221d160f265d671ac66", 0xc9, 0x3}, {&(0x7f0000000440)="3d238c437af0a71510fe41762a77779f4bdfe439c1c4ce7cecf89b07431df35051b617a7e81207a9d72af1ed19beb4fe4109c92855213080a5158ed64dcd957808b9a82e3b23d00ec861fb0704235ce23780dc883ce9a3feed9bd79ae260f5dc0d60236d30c865b17bffdf322195670af0b46a22c38149446fc38a7070098fa220ea37346c54ff9adc3b8300f5e49739db576fef2027c87a08b1cde2dd547f1fb60b81c52e947bb01898ce584da5", 0xae, 0x6}, {&(0x7f0000000500)="6fbf7c39bd017484fb72add46c3eaba0b72206132bf23c55cd9857521bb0b77517695d55d538ecc18c0757d7d4bdabb43fdbf36f002cfa250db28b28a8e78baa29dc033733778e031440aa969600abf0fcad46f2042a61885b40f6c0278442adf3093be6626ce87a631f27ce9f32b7ecbf11171957e5316296b1dccd41f563cb28b9b32b56a342b34cb8a24cc2a0b28f138c3660f1c676a5855ee4557463", 0x9e, 0x6}, {&(0x7f00000005c0)="eb02f098e3d70f19a684b9523515e608c82758dd6e3eb90f52878b6765100cd8abdb89c82970edf13ecbf499edbe51211656f9bed2babf2f68610b050406489461810a77d7c26ee4d90f8173d650ef795b07115f5a699ff74ebafb8c76541100dc6e61f9973f9a0928acae7d2f80298d259d4aec1c0ca677a593285ada5ab3966abe333531636cdf9855a9ff33643be01bbe291980774c5b7d3c0bbd0b860449d1c78a2c1ab962c9b83c72fc5773921e796a53da87ec49cee7b8f4cce489220e826b573ef9fb522e0995c816ccd65a2f7c584e7a022db142c396a91e4778af8600b4f5", 0xe3, 0x5}, {&(0x7f00000006c0)="06ba441a8159b1e7fcb0efd974acb5068801bff3c445a92b6424339c07e1b8de48ebded3673859157967382eb7f353674888cf220d81100c454c2ebff4d0b63a9992103d3afdc5c59a3ec76b79b61993ec251992d4dff863248e36da73685da385db13cd68449b65a4665a0e434b6d16f92571c3ecc7143d68063c68cac3647f83603df253f133fe04c90388f4042cec2ef7c19e44b3fd96a6d98f3df6ddab11e828f4b69536965fa3cb6f0cbbdcceb87c72793b1609c2f913a8393683ce21acd0876d231fd2a21e6db418d808bcf757ac327991319392fe65c6885c59877a876f", 0xe1, 0xffffffff}], 0xc040, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"]) [ 806.769254][ T7429] affs: Unrecognized mount option "!%@" or missing value [ 806.776390][ T7429] affs: Error parsing options [ 806.955807][ T7430] device bond0 entered promiscuous mode [ 806.962109][ T7430] device bond_slave_0 entered promiscuous mode [ 806.972941][ T7430] device bond_slave_1 entered promiscuous mode [ 806.995532][ T7430] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000edf10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:28 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8847}, 0x0) 23:55:28 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000c10000000001000"}) [ 807.246084][ T7437] loop1: detected capacity change from 0 to 264192 [ 807.281556][ T7437] gfs2: Unknown parameter 'ã¾{Mùacl' [ 807.355010][ T7430] device bond0 left promiscuous mode [ 807.361035][ T7430] device bond_slave_0 left promiscuous mode [ 807.396964][ T7430] device bond_slave_1 left promiscuous mode 23:55:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="2000edc02babf1ac6b3936288c3c2fcdf15eee1c0e34259a7ddf8f377e7b06"]) clone3(&(0x7f0000000340)={0x20008000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x1c}, &(0x7f0000000200)=""/131, 0x83, &(0x7f00000002c0), &(0x7f0000000300)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x7f, 0x40, 0x6, 0x0, 0x9, 0x400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x1f, 0x4}, 0x4050, 0x3f13, 0xb1f, 0x0, 0x3, 0x7fffffff, 0xfffa, 0x0, 0x5, 0x0, 0x3}, r1, 0x3, r0, 0x1) r2 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000003c0)=0x10) r3 = syz_open_dev$vcsa(&(0x7f0000000100), 0x3, 0x8040) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0xfffffffffffffffd) writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000400)="6dcbfde2bc60f91acd433d411d5a", 0xe}, {&(0x7f0000000440)="eb48edb9a3232853abd491c83feb5ddfe630fc53d498b6ba3bfff79ddbe7554716f3be964db2e872c01fb638890d90", 0x2f}, {&(0x7f0000000480)="4a862947620b9530c54fe987615443f9103fb76184f87b331228d9ec06cf3fbd3961f6d4b77717171bd7accd7e04d85337e2e7d11f1b03e98581856f32325c0e887bd5587c7d482e0a05cf5fd3248f9ecb5feaf3d489c2d64d77165a9303e24ab8438de2472ff8619a22a185137d5ea4b4b614232c657b4f65c36e2621d7b1d397949438f6d2eee1a977e09901b9d295e2e27fa5adb65ad65a2ca6acafc6753f0d3e0af534c6a46abb3936ab32d7fd586abbad36def3b13763c560259e7e2524769b403fdf05a254d5990e04683497747cfa707e91b5aef9ab3c9a173eda45f5f9388decd6ab9a1d95", 0xe9}, {&(0x7f0000000580)="59f2327190fb94dd8e1d", 0xa}], 0x4) 23:55:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000ff10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 807.648120][ T7459] device bond0 entered promiscuous mode [ 807.653876][ T7459] device bond_slave_0 entered promiscuous mode [ 807.660155][ T7459] device bond_slave_1 entered promiscuous mode [ 807.667055][ T7459] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8848}, 0x0) [ 807.727119][ T7459] device bond0 left promiscuous mode [ 807.732756][ T7459] device bond_slave_0 left promiscuous mode [ 807.736118][ T7466] affs: Unrecognized mount option " " or missing value [ 807.738782][ T7459] device bond_slave_1 left promiscuous mode [ 807.745600][ T7466] affs: Error parsing options 23:55:29 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2b3, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000d10000000001000"}) 23:55:29 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000000a000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 807.957609][ T7463] affs: Unrecognized mount option " " or missing value [ 807.967353][ T7463] affs: Error parsing options 23:55:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe502}, 0x0) 23:55:29 executing program 1: r0 = memfd_secret(0x0) recvmmsg(r0, &(0x7f0000001380)=[{{&(0x7f00000000c0)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000140)=""/89, 0x59}, {&(0x7f00000001c0)=""/223, 0xdf}, {&(0x7f0000000440)=""/207, 0xcf}, {&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000300)=""/102, 0x66}, {&(0x7f0000000540)=""/181, 0xb5}], 0x6, &(0x7f0000000680)=""/110, 0x6e}, 0x3}, {{&(0x7f0000000700)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000780)=""/215, 0xd7}, {&(0x7f00000003c0)=""/31, 0x1f}, {&(0x7f0000000880)=""/66, 0x42}, {&(0x7f0000000900)=""/133, 0x85}], 0x4, &(0x7f0000000a40)=""/187, 0xbb}}, {{&(0x7f0000000b00)=@l2={0x1f, 0x0, @fixed}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000b80)=""/49, 0x31}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)=""/123, 0x7b}], 0x3, &(0x7f0000000cc0)=""/148, 0x94}, 0x1}, {{&(0x7f0000000d80)=@ax25={{0x3, @null}, [@netrom, @null, @default, @remote, @netrom, @netrom, @default]}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000e00)=""/189, 0xbd}, {&(0x7f0000000ec0)=""/233, 0xe9}, {&(0x7f0000000fc0)=""/138, 0x8a}, {&(0x7f0000001080)=""/6, 0x6}, {&(0x7f00000010c0)=""/235, 0xeb}, {&(0x7f00000011c0)=""/112, 0x70}], 0x6, &(0x7f00000012c0)=""/168, 0xa8}, 0xe96d}], 0x4, 0x40000000, &(0x7f0000001480)={0x77359400}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) sendmsg(r2, &(0x7f0000001900)={&(0x7f00000014c0)=@pptp={0x18, 0x2, {0x1, @local}}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000bc0)="c8d6c3f9ba947e189984f68594f57d2aed37158baaf8a1592231", 0x1a}, {&(0x7f0000001540)="3dfc2f4ff6001c90fbcedd017d3a16380b0d7a8452a1f579dceb3ac66561a5d5cd6115bfb2d3e3fe7d9d830dd151464077018bc733170b397e18be85e8af5cf3faf3e64c56452c1b848d6bef13197d166c7c4158ce9b44aabcfa5752201f796935e4017f134733f9b3a3e60943fbe478ba8101537b0c61f75c1f21eb3e4779db229fcb918a92439463a350e44d6b8c755c93a71648c87d07c08452ebe7d0f7b57347a23a829b96b4ec88c0966441d53ceec71b8c3457fe5bc0a309", 0xbb}, {&(0x7f0000001600)="28f15b9bfad36b3496b775f5dbae001f749e77b5cbccbd428909f3e9e41e18bb82406a864b6b3d32a2ecf76549cf55fdbe0b18e7a7dce5521e25ce0f447e1b03a71c0611ffc3607c48845680633ca833fbdc3a15b74445bde675e6620f4b2917104184adef64e6cd99d956a68b8dc8c9a41a2741103303d36820bbe2118f23b4e1a2c75ed47bdb5520bbf66ad67265417cc504a422709dd98b142bde14d6c9bfe678b0e196ffa0d6e06763b6f3a5e43607a771", 0xb3}, {&(0x7f00000016c0)="d71bd2af70caa09ae4a1304113d5121e4689625cc799b037b2ac3efac2f25e94794331650c93f3ef9aab4ac4cbd0791dd0bc34ba3b903ca24ec531a93be47e676522c092fe36164f9c89ba0106136e65ee124e58d505a062c42b5b539ea4709116234fd0768c3633dea1346c84c4", 0x6e}, {&(0x7f0000001740)="d744fce6cea2d6a3b408d53c9f145dcb204e045c10437b3e2c3ddc56e827c6", 0x1f}, {&(0x7f0000001780)="3c0083327afda4e9fe0b900168e1ebf6b75c0fbd84b402ccc0348f98cd0e69a60e10aaa4311366b7a786e94ec660e9da4fdc276fe53fa70e9e034109e6f7fc8dfc9ed37b9585a949d720f14c0b916600185d4f8d086894fcbac133f41971ba69", 0x60}, {&(0x7f0000001800)="e09210dff8f1862b", 0x8}], 0x7, &(0x7f00000018c0)=[{0x20, 0x118, 0x8, "d40986d81342ba1a4f4cf4"}], 0x20}, 0x0) r3 = getpgid(0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) r4 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r4, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r4, 0x541c, 0x0) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000380)) sendmsg(r1, &(0x7f0000001a40)={&(0x7f0000001940)=@rc, 0x80, &(0x7f00000019c0), 0x0, &(0x7f0000001a00)=[{0x38, 0x10e, 0x3, "47b81467f0b493e25cc1c72f678d3c6492af981c7436e5405a4b800274830866e9714f0aaa78f7f1"}], 0x38}, 0x84) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x31, 0x81, 0x1, 0xae, 0x0, 0x81, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x7fffffff}, 0x44010, 0x8, 0x401, 0x7, 0x1000000000007, 0xb4, 0x1, 0x0, 0x6, 0x0, 0x3}, r3, 0xc, 0xffffffffffffffff, 0x1) 23:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000210000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000e10000000001000"}) 23:55:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="2000edc02babf1ac6b3936288c3c2fcdf15eee1c0e34259a7ddf8f377e7b06"]) clone3(&(0x7f0000000340)={0x20008000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0, {0x1c}, &(0x7f0000000200)=""/131, 0x83, &(0x7f00000002c0), &(0x7f0000000300)=[0xffffffffffffffff, 0x0], 0x2}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x7f, 0x40, 0x6, 0x0, 0x9, 0x400, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x1f, 0x4}, 0x4050, 0x3f13, 0xb1f, 0x0, 0x3, 0x7fffffff, 0xfffa, 0x0, 0x5, 0x0, 0x3}, r1, 0x3, r0, 0x1) r2 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f00000003c0)=0x10) r3 = syz_open_dev$vcsa(&(0x7f0000000100), 0x3, 0x8040) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, 0xfffffffffffffffd) writev(r2, &(0x7f00000005c0)=[{&(0x7f0000000400)="6dcbfde2bc60f91acd433d411d5a", 0xe}, {&(0x7f0000000440)="eb48edb9a3232853abd491c83feb5ddfe630fc53d498b6ba3bfff79ddbe7554716f3be964db2e872c01fb638890d90", 0x2f}, {&(0x7f0000000480)="4a862947620b9530c54fe987615443f9103fb76184f87b331228d9ec06cf3fbd3961f6d4b77717171bd7accd7e04d85337e2e7d11f1b03e98581856f32325c0e887bd5587c7d482e0a05cf5fd3248f9ecb5feaf3d489c2d64d77165a9303e24ab8438de2472ff8619a22a185137d5ea4b4b614232c657b4f65c36e2621d7b1d397949438f6d2eee1a977e09901b9d295e2e27fa5adb65ad65a2ca6acafc6753f0d3e0af534c6a46abb3936ab32d7fd586abbad36def3b13763c560259e7e2524769b403fdf05a254d5990e04683497747cfa707e91b5aef9ab3c9a173eda45f5f9388decd6ab9a1d95", 0xe9}, {&(0x7f0000000580)="59f2327190fb94dd8e1d", 0xa}], 0x4) [ 808.397319][ T1197] ieee802154 phy0 wpan0: encryption failed: -22 [ 808.403699][ T1197] ieee802154 phy1 wpan1: encryption failed: -22 23:55:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) [ 808.477985][ T7508] affs: Unrecognized mount option " " or missing value [ 808.478195][ T7496] device bond0 entered promiscuous mode [ 808.485055][ T7508] affs: Error parsing options [ 808.496051][ T7496] device bond_slave_0 entered promiscuous mode [ 808.505354][ T7496] device bond_slave_1 entered promiscuous mode [ 808.523770][ T7496] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000310000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 808.601059][ T7516] affs: Unrecognized mount option "!%@" or missing value [ 808.608570][ T7516] affs: Error parsing options 23:55:30 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x7, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) [ 808.648674][ T7496] device bond0 left promiscuous mode [ 808.655760][ T7496] device bond_slave_0 left promiscuous mode [ 808.665033][ T7496] device bond_slave_1 left promiscuous mode 23:55:30 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2bc, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:30 executing program 1: r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) dup2(r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xcf, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="2125402c001ee12b20e00a2f622e2695449906646c9c77a3075204bdbda428a04476ff5c550f98729af8f5c9bcec95a62100080000f802d6d2b426f7c4e2feb32786aa1eef3915215b0be35297992dc54fe81fb5ad88d9ea5699c08c353c64719f32212673ae061879773ad658"]) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000007800)=[{{&(0x7f00000002c0), 0x6e, &(0x7f0000001500)=[{&(0x7f0000000340)=""/7, 0x7}, {&(0x7f0000000380)=""/239, 0xef}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/77, 0x4d}], 0x4, &(0x7f0000001540)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{&(0x7f0000001580)=@abs, 0x6e, &(0x7f0000003740)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/93, 0x5d}, {&(0x7f0000002680)=""/145, 0x91}, {&(0x7f0000002740)=""/4096, 0x1000}], 0x4}}, {{&(0x7f0000003780)=@abs, 0x6e, &(0x7f0000004980)=[{&(0x7f0000003800)=""/22, 0x16}, {&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000004840)=""/191, 0xbf}, {&(0x7f0000004900)=""/86, 0x56}], 0x4, &(0x7f00000049c0)}}, {{&(0x7f0000004a00), 0x6e, &(0x7f0000006b40)=[{&(0x7f0000004a80)=""/4096, 0x1000}, {&(0x7f0000005a80)=""/4096, 0x1000}, {&(0x7f0000006a80)=""/110, 0x6e}, {&(0x7f0000006b00)}], 0x4, &(0x7f0000006b80)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000006bc0)=@abs, 0x6e, &(0x7f0000007000)=[{&(0x7f0000006c40)=""/54, 0x36}, {&(0x7f0000006c80)=""/138, 0x8a}, {&(0x7f0000006d40)=""/169, 0xa9}, {&(0x7f0000006e00)=""/194, 0xc2}, {&(0x7f0000006f00)=""/211, 0xd3}], 0x5, &(0x7f0000007080)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000007140), 0x6e, &(0x7f00000076c0)=[{&(0x7f00000071c0)=""/43, 0x2b}, {&(0x7f0000007200)=""/88, 0x58}, {&(0x7f0000007280)=""/213, 0xd5}, {&(0x7f0000007380)=""/233, 0xe9}, {&(0x7f0000007480)=""/85, 0x55}, {&(0x7f0000007500)=""/175, 0xaf}, {&(0x7f00000075c0)=""/5, 0x5}, {&(0x7f0000007600)=""/179, 0xb3}], 0x8, &(0x7f0000007740)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}}], 0x6, 0xa020, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000007980), 0x542, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x81, 0x8, 0x4, 0x3f, 0x0, 0x9, 0x8020, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0x2}, 0x50081, 0x0, 0x40, 0x8, 0xfff, 0x7ff, 0x401, 0x0, 0x3b0c, 0x0, 0x5}, r2, 0xe, r3, 0x3) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x300067) r5 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r5, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r5, 0x541c, 0x0) ioctl$TIOCGSID(r5, 0x5429, &(0x7f0000000380)) perf_event_open(&(0x7f00000079c0)={0x0, 0x80, 0xb3, 0xff, 0x20, 0x0, 0x0, 0x0, 0xc911, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x10001, 0x65b}, 0x100, 0x5, 0x8000, 0x4, 0x10000, 0x1, 0x0, 0x0, 0x7, 0x0, 0x9}, r4, 0xf, r5, 0xa) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0), 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7f, 0x80, 0x0, 0x1, 0x0, 0x2, 0x2004, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x80, 0x7, 0x97, 0x0, 0x858f, 0x3, 0x1c, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r6, 0xa) 23:55:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000df0e10000000001000"}) 23:55:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000410000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:30 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfeff}, 0x0) 23:55:30 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x6, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:30 executing program 0: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001110000000001000"}) 23:55:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 809.502897][ T7549] affs: Unrecognized mount option "!%@" or missing value [ 809.510833][ T7549] affs: Error parsing options 23:55:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xff0f}, 0x0) [ 809.687405][ T7557] device bond0 entered promiscuous mode [ 809.694051][ T7557] device bond_slave_0 entered promiscuous mode [ 809.704890][ T7557] device bond_slave_1 entered promiscuous mode [ 809.723048][ T7557] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 809.788428][ T7557] device bond0 left promiscuous mode [ 809.798655][ T7557] device bond_slave_0 left promiscuous mode [ 809.809149][ T7557] device bond_slave_1 left promiscuous mode 23:55:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001210000000001000"}) 23:55:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000610000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 810.107986][ T7549] affs: Unrecognized mount option "!%@" or missing value [ 810.115141][ T7549] affs: Error parsing options 23:55:31 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x2ce, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:55:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001810000000001000"}) 23:55:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000710000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:31 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) (fail_nth: 1) 23:55:31 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xfffe}, 0x0) [ 810.513933][ T7599] device bond0 entered promiscuous mode [ 810.519989][ T7599] device bond_slave_0 entered promiscuous mode [ 810.531620][ T7599] device bond_slave_1 entered promiscuous mode [ 810.546968][ T7599] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 810.595085][ T7599] device bond0 left promiscuous mode [ 810.600942][ T7599] device bond_slave_0 left promiscuous mode [ 810.610213][ T7599] device bond_slave_1 left promiscuous mode 23:55:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000002510000000001000"}) [ 810.743410][ T7618] FAULT_INJECTION: forcing a failure. [ 810.743410][ T7618] name failslab, interval 1, probability 0, space 0, times 0 [ 810.756687][ T7618] CPU: 1 PID: 7618 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 810.765025][ T7618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 810.775083][ T7618] Call Trace: [ 810.778352][ T7618] [ 810.781266][ T7618] dump_stack_lvl+0x201/0x2d8 [ 810.785944][ T7618] ? show_regs_print_info+0x12/0x12 [ 810.791159][ T7618] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 810.796894][ T7618] ? __might_sleep+0xe0/0xe0 [ 810.801492][ T7618] ? rcu_read_lock_sched_held+0x89/0x130 [ 810.807144][ T7618] should_fail+0x384/0x4b0 [ 810.809385][ T7620] affs: Unrecognized mount option "!%@" or missing value [ 810.811577][ T7618] ? tomoyo_realpath_from_path+0xd8/0x610 [ 810.811602][ T7618] should_failslab+0x5/0x20 [ 810.811624][ T7618] __kmalloc+0x94/0x380 [ 810.811641][ T7618] ? kfree+0x2f/0x330 [ 810.811663][ T7618] tomoyo_realpath_from_path+0xd8/0x610 [ 810.818694][ T7620] affs: Error parsing options [ 810.824395][ T7618] tomoyo_path_number_perm+0x219/0x7c0 [ 810.824431][ T7618] ? rcu_read_lock_sched_held+0x89/0x130 [ 810.824453][ T7618] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 810.863823][ T7618] ? __fget_files+0x35a/0x390 [ 810.868526][ T7618] security_file_ioctl+0x55/0xb0 [ 810.873485][ T7618] __se_sys_ioctl+0x48/0x170 [ 810.878091][ T7618] do_syscall_64+0x44/0xd0 [ 810.882521][ T7618] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 810.888421][ T7618] RIP: 0033:0x7f1d9ecefae9 [ 810.893191][ T7618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 810.912803][ T7618] RSP: 002b:00007f1d9c265188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 810.921232][ T7618] RAX: ffffffffffffffda RBX: 00007f1d9ee02f60 RCX: 00007f1d9ecefae9 [ 810.929218][ T7618] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000004 [ 810.937281][ T7618] RBP: 00007f1d9c2651d0 R08: 0000000000000000 R09: 0000000000000000 [ 810.945262][ T7618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 810.953242][ T7618] R13: 00007ffe32fb85af R14: 00007f1d9c265300 R15: 0000000000022000 [ 810.961238][ T7618] [ 810.964698][ T7618] ERROR: Out of memory at tomoyo_realpath_from_path. 23:55:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000810000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x733}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x20, 0x7, 0x5, 0x0, 0x8, 0x8910, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0xc51b, 0x80}, 0x8200, 0x0, 0x1, 0x4, 0x2, 0x0, 0x3, 0x0, 0x9, 0x0, 0x6}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="21254028d2f1a06038a57383fe2b2c00"]) 23:55:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 811.189971][ T7599] device bond0 entered promiscuous mode [ 811.195749][ T7599] device bond_slave_0 entered promiscuous mode [ 811.202124][ T7599] device bond_slave_1 entered promiscuous mode [ 811.209225][ T7599] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000004010000000001000"}) [ 811.360672][ T7645] affs: Unrecognized mount option "!%@(Òñ `8¥sƒþ+" or missing value [ 811.369234][ T7645] affs: Error parsing options 23:55:32 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) (fail_nth: 2) [ 811.447755][ T7599] device bond0 left promiscuous mode [ 811.453452][ T7599] device bond_slave_0 left promiscuous mode [ 811.459470][ T7599] device bond_slave_1 left promiscuous mode [ 811.465171][ T7654] affs: Unrecognized mount option "!%@(Òñ `8¥sƒþ+" or missing value [ 811.473406][ T7654] affs: Error parsing options [ 811.585461][ T7660] FAULT_INJECTION: forcing a failure. [ 811.585461][ T7660] name failslab, interval 1, probability 0, space 0, times 0 [ 811.598415][ T7660] CPU: 0 PID: 7660 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 811.606801][ T7660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 811.616871][ T7660] Call Trace: [ 811.620158][ T7660] [ 811.623097][ T7660] dump_stack_lvl+0x201/0x2d8 [ 811.627799][ T7660] ? show_regs_print_info+0x12/0x12 [ 811.633015][ T7660] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 811.638754][ T7660] ? __might_sleep+0xe0/0xe0 [ 811.643368][ T7660] should_fail+0x384/0x4b0 [ 811.647805][ T7660] ? tomoyo_encode2+0x25a/0x560 [ 811.652666][ T7660] should_failslab+0x5/0x20 [ 811.657187][ T7660] __kmalloc+0x94/0x380 [ 811.661361][ T7660] tomoyo_encode2+0x25a/0x560 [ 811.666055][ T7660] tomoyo_realpath_from_path+0x5c3/0x610 [ 811.671714][ T7660] tomoyo_path_number_perm+0x219/0x7c0 [ 811.677193][ T7660] ? rcu_read_lock_sched_held+0x89/0x130 [ 811.682839][ T7660] ? tomoyo_check_path_acl+0x1c0/0x1c0 [ 811.688364][ T7660] ? __fget_files+0x35a/0x390 [ 811.693066][ T7660] security_file_ioctl+0x55/0xb0 [ 811.698033][ T7660] __se_sys_ioctl+0x48/0x170 [ 811.702641][ T7660] do_syscall_64+0x44/0xd0 [ 811.707070][ T7660] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 811.712974][ T7660] RIP: 0033:0x7f1d9ecefae9 [ 811.717393][ T7660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 811.736992][ T7660] RSP: 002b:00007f1d9c265188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 811.745399][ T7660] RAX: ffffffffffffffda RBX: 00007f1d9ee02f60 RCX: 00007f1d9ecefae9 [ 811.753390][ T7660] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000004 [ 811.761376][ T7660] RBP: 00007f1d9c2651d0 R08: 0000000000000000 R09: 0000000000000000 [ 811.769336][ T7660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 811.777293][ T7660] R13: 00007ffe32fb85af R14: 00007f1d9c265300 R15: 0000000000022000 [ 811.785275][ T7660] [ 811.789117][ T7660] ERROR: Out of memory at tomoyo_realpath_from_path. 23:55:33 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x300, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000910000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2125402c00042a61f4a040ff862449d28be9259f789a1d81cf5b1a869bc8eb457445fe6d9d93d2496890268ffdecce7416cedbde46bb3a87714ce6556366e99ca6e4b4c0ee25410ae66a4769f07b92fb35b6a1ebdb0d3857518882df7e69aeaa68c648bd1aa933f98973e71d4ce89e8bc96b5595e13976ed94bab9b78e3af4fd841ea1b54d3d7b3d4cc7922c6966a9368b3df7d002e0481aeb9a7ea5503e2f67426ed2f746a64130d0b54e3081e69e26142e94"]) 23:55:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000055410000000001000"}) 23:55:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) (fail_nth: 3) 23:55:33 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 811.999082][ T7673] FAULT_INJECTION: forcing a failure. [ 811.999082][ T7673] name failslab, interval 1, probability 0, space 0, times 0 [ 811.999385][ T7673] [ 811.999390][ T7673] ====================================================== [ 811.999396][ T7673] WARNING: possible circular locking dependency detected [ 811.999410][ T7673] 5.15.0-syzkaller #0 Not tainted [ 811.999419][ T7673] ------------------------------------------------------ [ 811.999424][ T7673] syz-executor.0/7673 is trying to acquire lock: [ 811.999432][ T7673] ffffffff8cb12240 (console_owner){-.-.}-{0:0}, at: console_lock_spinning_enable+0x2d/0x60 [ 811.999477][ T7673] [ 811.999477][ T7673] but task is already holding lock: [ 811.999482][ T7673] ffff88807be29958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xc5/0x170 [ 811.999516][ T7673] [ 811.999516][ T7673] which lock already depends on the new lock. [ 811.999516][ T7673] [ 811.999521][ T7673] [ 811.999521][ T7673] the existing dependency chain (in reverse order) is: [ 811.999527][ T7673] [ 811.999527][ T7673] -> #2 (&port->lock){-.-.}-{2:2}: [ 811.999547][ T7673] lock_acquire+0x19f/0x4d0 [ 811.999562][ T7673] _raw_spin_lock_irqsave+0xd1/0x120 [ 811.999580][ T7673] tty_port_tty_get+0x21/0xe0 [ 811.999594][ T7673] tty_port_default_wakeup+0x11/0x40 [ 811.999608][ T7673] serial8250_tx_chars+0x68e/0x8a0 [ 811.999697][ T7673] serial8250_handle_irq+0x2fd/0x3e0 [ 811.999712][ T7673] serial8250_default_handle_irq+0xaf/0x190 [ 811.999728][ T7673] serial8250_interrupt+0xa3/0x1e0 [ 811.999741][ T7673] __handle_irq_event_percpu+0x20d/0x730 [ 811.999754][ T7673] handle_irq_event+0x10a/0x300 [ 811.999765][ T7673] handle_edge_irq+0x245/0xbe0 [ 811.999779][ T7673] __common_interrupt+0xce/0x1e0 [ 811.999855][ T7673] common_interrupt+0x9f/0xc0 [ 811.999872][ T7673] asm_common_interrupt+0x1e/0x40 [ 811.999886][ T7673] _raw_spin_unlock_irqrestore+0xd4/0x130 [ 811.999899][ T7673] uart_write+0x6ad/0x920 [ 811.999912][ T7673] do_output_char+0x638/0x940 [ 811.999930][ T7673] n_tty_write+0xe95/0x1320 [ 811.999944][ T7673] file_tty_write+0x5c5/0x9a0 [ 811.999956][ T7673] do_iter_readv_writev+0x54f/0x740 [ 811.999972][ T7673] do_iter_write+0x21e/0x7b0 [ 811.999986][ T7673] do_writev+0x279/0x470 [ 812.000000][ T7673] do_syscall_64+0x44/0xd0 [ 812.000013][ T7673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 812.000030][ T7673] [ 812.000030][ T7673] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 812.000052][ T7673] lock_acquire+0x19f/0x4d0 [ 812.000066][ T7673] _raw_spin_lock_irqsave+0xd1/0x120 [ 812.000082][ T7673] serial8250_console_write+0x19c/0xf30 [ 812.000098][ T7673] console_unlock+0xb00/0xe90 [ 812.000111][ T7673] vprintk_emit+0xba/0x140 [ 812.000124][ T7673] _printk+0xcf/0x118 [ 812.000135][ T7673] register_console+0x6bd/0x9a0 [ 812.000149][ T7673] univ8250_console_init+0x41/0x43 [ 812.000214][ T7673] console_init+0x52/0x97 [ 812.000234][ T7673] start_kernel+0x32d/0x56e [ 812.000246][ T7673] secondary_startup_64_no_verify+0xb1/0xbb [ 812.000266][ T7673] [ 812.000266][ T7673] -> #0 (console_owner){-.-.}-{0:0}: [ 812.000286][ T7673] validate_chain+0x1dfb/0x8240 [ 812.000298][ T7673] __lock_acquire+0x1382/0x2b00 [ 812.000312][ T7673] lock_acquire+0x19f/0x4d0 [ 812.000324][ T7673] console_lock_spinning_enable+0x52/0x60 [ 812.000340][ T7673] console_unlock+0x834/0xe90 [ 812.000352][ T7673] vprintk_emit+0xba/0x140 [ 812.000365][ T7673] _printk+0xcf/0x118 [ 812.000376][ T7673] should_fail+0x366/0x4b0 [ 812.000390][ T7673] should_failslab+0x5/0x20 [ 812.000412][ T7673] __kmalloc+0x94/0x380 [ 812.000425][ T7673] __tty_buffer_request_room+0x1f0/0x540 [ 812.000438][ T7673] tty_insert_flip_string_fixed_flag+0x92/0x2c0 [ 812.000451][ T7673] pty_write+0xe9/0x170 [ 812.000464][ T7673] tty_put_char+0x115/0x180 [ 812.000478][ T7673] __process_echoes+0x461/0x930 [ 812.000493][ T7673] n_tty_receive_buf_common+0x20ea/0x81d0 [ 812.000509][ T7673] tty_ioctl+0xe30/0x17d0 [ 812.000522][ T7673] __se_sys_ioctl+0xfb/0x170 [ 812.000534][ T7673] do_syscall_64+0x44/0xd0 [ 812.000546][ T7673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 812.000561][ T7673] [ 812.000561][ T7673] other info that might help us debug this: [ 812.000561][ T7673] [ 812.000566][ T7673] Chain exists of: [ 812.000566][ T7673] console_owner --> &port_lock_key --> &port->lock [ 812.000566][ T7673] [ 812.000586][ T7673] Possible unsafe locking scenario: [ 812.000586][ T7673] [ 812.000590][ T7673] CPU0 CPU1 [ 812.000594][ T7673] ---- ---- [ 812.000598][ T7673] lock(&port->lock); [ 812.000606][ T7673] lock(&port_lock_key); [ 812.000616][ T7673] lock(&port->lock); [ 812.000626][ T7673] lock(console_owner); [ 812.000634][ T7673] [ 812.000634][ T7673] *** DEADLOCK *** [ 812.000634][ T7673] [ 812.000638][ T7673] 6 locks held by syz-executor.0/7673: [ 812.000647][ T7673] #0: ffff88807272f098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x21/0x70 [ 812.000681][ T7673] #1: ffff888019dc80b8 (&port->buf.lock/1){+.+.}-{3:3}, at: tty_ioctl+0xdba/0x17d0 [ 812.000720][ T7673] #2: ffff88807272f2e8 (&o_tty->termios_rwsem/1){++++}-{3:3}, at: n_tty_receive_buf_common+0x8e/0x81d0 [ 812.000761][ T7673] #3: ffffc9000afc3378 (&ldata->output_lock){+.+.}-{3:3}, at: n_tty_receive_buf_common+0x20a2/0x81d0 [ 812.000798][ T7673] #4: ffff88807be29958 (&port->lock){-.-.}-{2:2}, at: pty_write+0xc5/0x170 [ 812.000832][ T7673] #5: ffffffff8c9f9ee0 (console_lock){+.+.}-{0:0}, at: vprintk_emit+0xa1/0x140 [ 812.000864][ T7673] [ 812.000864][ T7673] stack backtrace: [ 812.000869][ T7673] CPU: 0 PID: 7673 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 812.000886][ T7673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.000894][ T7673] Call Trace: [ 812.000899][ T7673] [ 812.000906][ T7673] dump_stack_lvl+0x1dc/0x2d8 [ 812.000924][ T7673] ? show_regs_print_info+0x12/0x12 [ 812.000940][ T7673] ? save_trace+0x5a/0x9f0 [ 812.000958][ T7673] ? print_circular_bug+0x48e/0x5d0 [ 812.000976][ T7673] check_noncircular+0x2f9/0x3b0 [ 812.000996][ T7673] ? add_chain_block+0x850/0x850 [ 812.001012][ T7673] ? lockdep_lock+0x11d/0x2e0 [ 812.001027][ T7673] ? _find_first_zero_bit+0xe1/0x100 [ 812.001047][ T7673] validate_chain+0x1dfb/0x8240 [ 812.001071][ T7673] ? reacquire_held_locks+0x620/0x620 [ 812.001085][ T7673] ? mark_lock+0x191/0x1e00 [ 812.001101][ T7673] ? __print_lock_name+0x1d0/0x1d0 [ 812.001117][ T7673] ? memcpy+0x3c/0x60 [ 812.001139][ T7673] ? ptr_to_hashval+0x60/0x60 [ 812.001160][ T7673] __lock_acquire+0x1382/0x2b00 [ 812.001183][ T7673] ? trace_lock_acquire+0x190/0x190 [ 812.001199][ T7673] ? rcu_read_lock_sched_held+0x89/0x130 [ 812.001217][ T7673] ? __bpf_trace_rcu_stall_warning+0x10/0x10 [ 812.001234][ T7673] ? info_print_prefix+0x205/0x300 [ 812.001254][ T7673] lock_acquire+0x19f/0x4d0 [ 812.001269][ T7673] ? console_lock_spinning_enable+0x2d/0x60 [ 812.001290][ T7673] ? read_lock_is_recursive+0x10/0x10 [ 812.001306][ T7673] ? console_lock_spinning_enable+0x2d/0x60 [ 812.001323][ T7673] ? __lock_acquire+0x2b00/0x2b00 [ 812.001338][ T7673] ? do_raw_spin_lock+0x151/0x8e0 [ 812.001358][ T7673] ? _raw_spin_unlock+0x40/0x40 [ 812.001377][ T7673] console_lock_spinning_enable+0x52/0x60 [ 812.001394][ T7673] ? console_lock_spinning_enable+0x2d/0x60 [ 812.001418][ T7673] console_unlock+0x834/0xe90 [ 812.001438][ T7673] ? console_trylock_spinning+0x3f0/0x3f0 [ 812.001455][ T7673] ? vprintk_emit+0xa1/0x140 [ 812.001470][ T7673] ? console_trylock+0x70/0x70 [ 812.001487][ T7673] ? reacquire_held_locks+0x620/0x620 [ 812.001503][ T7673] ? mark_lock+0x191/0x1e00 [ 812.001524][ T7673] ? __lock_acquire+0x1382/0x2b00 [ 812.001544][ T7673] vprintk_emit+0xba/0x140 [ 812.001561][ T7673] _printk+0xcf/0x118 [ 812.001579][ T7673] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 812.001601][ T7673] should_fail+0x366/0x4b0 [ 812.001619][ T7673] ? __tty_buffer_request_room+0x1f0/0x540 [ 812.001635][ T7673] should_failslab+0x5/0x20 [ 812.001652][ T7673] __kmalloc+0x94/0x380 [ 812.001669][ T7673] __tty_buffer_request_room+0x1f0/0x540 [ 812.001688][ T7673] tty_insert_flip_string_fixed_flag+0x92/0x2c0 [ 812.001709][ T7673] pty_write+0xe9/0x170 [ 812.001725][ T7673] tty_put_char+0x115/0x180 [ 812.001742][ T7673] ? do_SAK_work+0x20/0x20 [ 812.001759][ T7673] ? mutex_lock_io_nested+0x60/0x60 [ 812.001774][ T7673] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 812.001794][ T7673] __process_echoes+0x461/0x930 [ 812.001816][ T7673] n_tty_receive_buf_common+0x20ea/0x81d0 [ 812.001841][ T7673] ? read_lock_is_recursive+0x10/0x10 [ 812.001868][ T7673] ? n_tty_poll+0x790/0x790 [ 812.001886][ T7673] tty_ioctl+0xe30/0x17d0 [ 812.001904][ T7673] ? tty_get_icount+0xa0/0xa0 [ 812.001925][ T7673] ? memset+0x1f/0x40 [ 812.001941][ T7673] ? smack_file_ioctl+0x298/0x3a0 [ 812.001961][ T7673] ? smack_file_alloc_security+0xd0/0xd0 [ 812.001982][ T7673] ? __fget_files+0x35a/0x390 [ 812.001997][ T7673] ? bpf_lsm_file_ioctl+0x5/0x10 [ 812.002013][ T7673] ? security_file_ioctl+0x9d/0xb0 [ 812.002030][ T7673] ? tty_get_icount+0xa0/0xa0 [ 812.002044][ T7673] __se_sys_ioctl+0xfb/0x170 [ 812.002059][ T7673] do_syscall_64+0x44/0xd0 [ 812.002074][ T7673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 812.002092][ T7673] RIP: 0033:0x7f1d9ecefae9 [ 812.002106][ T7673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 812.002120][ T7673] RSP: 002b:00007f1d9c265188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 812.002138][ T7673] RAX: ffffffffffffffda RBX: 00007f1d9ee02f60 RCX: 00007f1d9ecefae9 [ 812.002150][ T7673] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000004 [ 812.002161][ T7673] RBP: 00007f1d9c2651d0 R08: 0000000000000000 R09: 0000000000000000 [ 812.002172][ T7673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 812.002182][ T7673] R13: 00007ffe32fb85af R14: 00007f1d9c265300 R15: 0000000000022000 [ 812.002201][ T7673] [ 812.117855][ T7680] device bond0 entered promiscuous mode [ 812.123578][ T7673] CPU: 0 PID: 7673 Comm: syz-executor.0 Not tainted 5.15.0-syzkaller #0 [ 812.123599][ T7673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 812.123607][ T7673] Call Trace: [ 812.123614][ T7673] [ 812.123621][ T7673] dump_stack_lvl+0x1dc/0x2d8 [ 812.123646][ T7673] ? show_regs_print_info+0x12/0x12 [ 812.123661][ T7673] ? log_buf_vmcoreinfo_setup+0x498/0x498 [ 812.123684][ T7673] should_fail+0x384/0x4b0 [ 812.123703][ T7673] ? __tty_buffer_request_room+0x1f0/0x540 [ 812.123720][ T7673] should_failslab+0x5/0x20 [ 812.123740][ T7673] __kmalloc+0x94/0x380 [ 812.123758][ T7673] __tty_buffer_request_room+0x1f0/0x540 [ 812.123779][ T7673] tty_insert_flip_string_fixed_flag+0x92/0x2c0 [ 812.123799][ T7673] pty_write+0xe9/0x170 [ 812.123818][ T7673] tty_put_char+0x115/0x180 [ 812.123837][ T7673] ? do_SAK_work+0x20/0x20 [ 812.129482][ T7680] device bond_slave_0 entered promiscuous mode [ 812.135241][ T7673] ? mutex_lock_io_nested+0x60/0x60 [ 812.135261][ T7673] ? _raw_spin_unlock_irqrestore+0x8b/0x130 [ 812.135279][ T7673] __process_echoes+0x461/0x930 [ 812.135300][ T7673] n_tty_receive_buf_common+0x20ea/0x81d0 [ 812.135325][ T7673] ? read_lock_is_recursive+0x10/0x10 [ 812.135351][ T7673] ? n_tty_poll+0x790/0x790 [ 812.135369][ T7673] tty_ioctl+0xe30/0x17d0 [ 812.135394][ T7673] ? tty_get_icount+0xa0/0xa0 [ 812.142136][ T7680] device bond_slave_1 entered promiscuous mode [ 812.147394][ T7673] ? memset+0x1f/0x40 [ 812.154712][ T7680] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 812.158872][ T7673] ? smack_file_ioctl+0x298/0x3a0 [ 812.158895][ T7673] ? smack_file_alloc_security+0xd0/0xd0 [ 812.158917][ T7673] ? __fget_files+0x35a/0x390 [ 812.318004][ T7685] affs: Unrecognized mount option "!%@" or missing value [ 812.318153][ T7673] ? bpf_lsm_file_ioctl+0x5/0x10 [ 812.323240][ T7685] affs: Error parsing options [ 812.329377][ T7673] ? security_file_ioctl+0x9d/0xb0 [ 813.166986][ T7673] ? tty_get_icount+0xa0/0xa0 [ 813.171650][ T7673] __se_sys_ioctl+0xfb/0x170 [ 813.176233][ T7673] do_syscall_64+0x44/0xd0 [ 813.180634][ T7673] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 813.186513][ T7673] RIP: 0033:0x7f1d9ecefae9 [ 813.190909][ T7673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 813.210493][ T7673] RSP: 002b:00007f1d9c265188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 813.218909][ T7673] RAX: ffffffffffffffda RBX: 00007f1d9ee02f60 RCX: 00007f1d9ecefae9 [ 813.226861][ T7673] RDX: 0000000020000000 RSI: 0000000000005412 RDI: 0000000000000004 [ 813.234836][ T7673] RBP: 00007f1d9c2651d0 R08: 0000000000000000 R09: 0000000000000000 [ 813.242787][ T7673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:55:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005c10000000001000"}) 23:55:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000a10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x8010, r0, 0x3ebc6000) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="702740270200afbdab539879e67f22462397f66b369dcf0045e0405c494cec05ea3a00318a4d6f2638bf1a1b5ef211d5d26b6397b8cb1a79e80547b06712f906c84ae7b85c"]) 23:55:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000007a10000000001000"}) [ 813.250778][ T7673] R13: 00007ffe32fb85af R14: 00007f1d9c265300 R15: 0000000000022000 [ 813.258822][ T7673] [ 813.270027][ T7680] device bond0 left promiscuous mode [ 813.275583][ T7680] device bond_slave_0 left promiscuous mode [ 813.281564][ T7680] device bond_slave_1 left promiscuous mode 23:55:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000b10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) [ 813.373642][ T7677] device bond0 entered promiscuous mode [ 813.379234][ T7677] device bond_slave_0 entered promiscuous mode [ 813.385905][ T7677] device bond_slave_1 entered promiscuous mode [ 813.392464][ T7677] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 813.428717][ T7677] device bond0 left promiscuous mode [ 813.434245][ T7677] device bond_slave_0 left promiscuous mode [ 813.435164][ T7708] affs: Unrecognized mount option "p'@'" or missing value [ 813.440273][ T7677] device bond_slave_1 left promiscuous mode [ 813.447472][ T7708] affs: Error parsing options 23:55:34 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x31c, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000c10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "0000000010000000000edf10000000001000"}) 23:55:34 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 23:55:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) [ 813.548014][ T7708] affs: Unrecognized mount option "p'@'" or missing value [ 813.555788][ T7708] affs: Error parsing options 23:55:35 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0xff, 0x10, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, r0, 0x1, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="a8163bf06f6e1a4e773f8a7b0e4b2125402c00"]) [ 813.647492][ T7734] device bond0 entered promiscuous mode [ 813.653160][ T7734] device bond_slave_0 entered promiscuous mode [ 813.659710][ T7734] device bond_slave_1 entered promiscuous mode [ 813.667248][ T7734] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x2, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000ff10000000001000"}) 23:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000d10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 813.704176][ T7734] device bond0 left promiscuous mode [ 813.709591][ T7734] device bond_slave_0 left promiscuous mode [ 813.716156][ T7734] device bond_slave_1 left promiscuous mode 23:55:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 813.784723][ T7753] affs: Unrecognized mount option "¨;ðonNw?Š{K!%@" or missing value [ 813.793098][ T7753] affs: Error parsing options 23:55:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x10, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000e10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 813.856693][ T7734] device bond0 entered promiscuous mode [ 813.862452][ T7734] device bond_slave_0 entered promiscuous mode [ 813.868712][ T7734] device bond_slave_1 entered promiscuous mode [ 813.875257][ T7734] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 813.919823][ T7774] affs: Unrecognized mount option "¨;ðonNw?Š{K!%@" or missing value [ 813.928586][ T7774] affs: Error parsing options [ 813.945999][ T7734] device bond0 left promiscuous mode [ 813.951320][ T7734] device bond_slave_0 left promiscuous mode [ 813.957442][ T7734] device bond_slave_1 left promiscuous mode 23:55:35 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x358, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000000a000000001000"}) 23:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001010000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x707, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 23:55:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_DEV_REPLACE(r0, 0xca289435, &(0x7f0000000240)={0x0, 0x2, @status={[0x575b, 0x10001, 0x5, 0x8, 0x7ff, 0x5]}, [0x6, 0x2, 0x5, 0x0, 0x2, 0xe0f0, 0xd7d, 0x9, 0x9, 0x5926, 0x5, 0x5, 0x9, 0xbc1, 0x6, 0x8001, 0x2, 0x7ff, 0x5, 0x7fff, 0x0, 0x9, 0x10001, 0x4, 0x4, 0x5, 0x0, 0xd4a7, 0x260258f7, 0x10000, 0x2, 0x8, 0x6, 0x2, 0xdda, 0x8, 0x8, 0x6, 0xfc58, 0x1, 0x180000, 0x8000, 0x641, 0x7, 0x2, 0x6, 0x80000001, 0x800, 0x8c04, 0x10001, 0x7b79, 0x1, 0x4, 0x80000000, 0x0, 0x6, 0x6, 0x7, 0x8001, 0xd3, 0xff7, 0x9, 0x3, 0xda]}) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\b\x00\x00']) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) r2 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x6, 0xe9, 0x33, 0x8, 0x0, 0x7, 0x180, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xfffffff8, 0x2, @perf_bp={&(0x7f0000000080), 0x7}, 0x100, 0x7, 0x10001, 0x6, 0x2, 0x6, 0x401, 0x0, 0x0, 0x0, 0x7ff}, r1, 0xe, r2, 0x10) [ 814.137348][ T7797] device bond0 entered promiscuous mode [ 814.143017][ T7797] device bond_slave_0 entered promiscuous mode [ 814.149532][ T7797] device bond_slave_1 entered promiscuous mode [ 814.157018][ T7797] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001110000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000210000000001000"}) [ 814.190213][ T7797] device bond0 left promiscuous mode [ 814.195802][ T7797] device bond_slave_0 left promiscuous mode [ 814.202115][ T7797] device bond_slave_1 left promiscuous mode [ 814.206933][ T7798] affs: No valid root block on device loop1 23:55:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x4c00, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000310000000001000"}) 23:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001210000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 814.300033][ T7809] affs: No valid root block on device loop1 23:55:35 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5000000}, 0x0) [ 814.345358][ T7797] device bond0 entered promiscuous mode [ 814.350994][ T7797] device bond_slave_0 entered promiscuous mode [ 814.357709][ T7797] device bond_slave_1 entered promiscuous mode [ 814.365315][ T7797] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 814.386930][ T7797] device bond0 left promiscuous mode [ 814.392459][ T7797] device bond_slave_0 left promiscuous mode [ 814.398446][ T7797] device bond_slave_1 left promiscuous mode 23:55:35 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x399, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000410000000001000"}) 23:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001810000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:35 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x4c01, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x10000, 0x6}, 0x0, 0x0, 0x2, 0x3, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) fsetxattr$smack_xattr_label(0xffffffffffffffff, &(0x7f00000001c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)={'..-@\'!'}, 0x7, 0x1) r0 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, 0x0) r1 = creat(&(0x7f0000000400)='./file0/file1\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0), 0xd4ba0ff) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) fadvise64(r2, 0x401, 0x6, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000280)={&(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0xcec}, 0x1, 0x0, 0x0, 0x24000000}, 0x8000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x400) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xce, 0x6, 0xf6, 0x3, 0x0, 0x0, 0x400, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x3001, 0xfffffffffffffff8, 0x8, 0x0, 0x3, 0xfffffffa, 0x101, 0x0, 0x7, 0x0, 0x5}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x10) [ 814.560605][ T7855] device bond0 entered promiscuous mode [ 814.566378][ T7855] device bond_slave_0 entered promiscuous mode [ 814.573057][ T7855] device bond_slave_1 entered promiscuous mode [ 814.580615][ T7855] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 814.601329][ T7855] device bond0 left promiscuous mode [ 814.606937][ T7855] device bond_slave_0 left promiscuous mode [ 814.613399][ T7855] device bond_slave_1 left promiscuous mode [ 814.613499][ T7861] affs: Unrecognized mount option "!%@" or missing value [ 814.626509][ T7861] affs: Error parsing options 23:55:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000510000000001000"}) 23:55:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000002510000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5409, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x6000000}, 0x0) 23:55:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x540b, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005c10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000610000000001000"}) [ 814.798750][ T7855] device bond0 entered promiscuous mode [ 814.804431][ T7855] device bond_slave_0 entered promiscuous mode [ 814.810713][ T7855] device bond_slave_1 entered promiscuous mode [ 814.817552][ T7855] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 814.912964][ T7855] device bond0 left promiscuous mode [ 814.918331][ T7855] device bond_slave_0 left promiscuous mode [ 814.924524][ T7855] device bond_slave_1 left promiscuous mode 23:55:36 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3b8, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000710000000001000"}) 23:55:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000007a10000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x540c, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) [ 815.173411][ T7917] device bond0 entered promiscuous mode [ 815.179033][ T7917] device bond_slave_0 entered promiscuous mode [ 815.185543][ T7917] device bond_slave_1 entered promiscuous mode [ 815.192983][ T7917] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 815.203423][ T7917] device bond0 left promiscuous mode [ 815.208773][ T7917] device bond_slave_0 left promiscuous mode [ 815.215540][ T7917] device bond_slave_1 left promiscuous mode [ 815.413380][ T7870] affs: Unrecognized mount option "!%@" or missing value [ 815.420501][ T7870] affs: Error parsing options 23:55:36 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x540d, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:36 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x7000000}, 0x0) 23:55:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000810000000001000"}) 23:55:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000005412000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xd0, 0x3, 0x6, 0x80, 0x0, 0x8000, 0x200, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x6, 0x6}, 0x20, 0x83, 0xfffffff7, 0x6, 0x9385, 0x10000, 0x4bf, 0x0, 0x9, 0x0, 0x5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x1) syz_mount_image$affs(&(0x7f0000000100), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000200)={[{'!%@'}], [{@fsmagic={'fsmagic', 0x3d, 0x27}}, {@obj_user={'obj_user', 0x3d, 'permit_directio'}}, {@euid_eq={'euid', 0x3d, 0xee01}}]}) 23:55:36 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3e8, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 815.615992][ T7944] device bond0 entered promiscuous mode [ 815.621667][ T7944] device bond_slave_0 entered promiscuous mode [ 815.623147][ T7949] affs: Unrecognized mount option "!%@" or missing value [ 815.628481][ T7944] device bond_slave_1 entered promiscuous mode [ 815.634980][ T7949] affs: Error parsing options [ 815.642467][ T7944] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000029000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5413, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) [ 815.679054][ T7944] device bond0 left promiscuous mode [ 815.684976][ T7944] device bond_slave_0 left promiscuous mode [ 815.691289][ T7944] device bond_slave_1 left promiscuous mode 23:55:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000910000000001000"}) 23:55:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x9000000}, 0x0) 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5414, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) [ 815.806359][ T7972] affs: Unrecognized mount option "!%@" or missing value [ 815.813664][ T7972] affs: Error parsing options [ 815.838144][ T7944] device bond0 entered promiscuous mode [ 815.843799][ T7944] device bond_slave_0 entered promiscuous mode [ 815.850378][ T7944] device bond_slave_1 entered promiscuous mode 23:55:37 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x20400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) connect$tipc(r0, &(0x7f0000000140)=@name={0x1e, 0x2, 0x3, {{0x557633cdcd324143, 0x1}, 0x2}}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/locks\x00', 0x0, 0x0) recvmmsg$unix(r1, &(0x7f0000001580)=[{{&(0x7f0000000340), 0x6e, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/42, 0x2a}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2}}, {{&(0x7f0000000440), 0x6e, &(0x7f0000001500), 0x0, &(0x7f0000001540)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0x2, 0x2141, &(0x7f0000001600)) r2 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="2125402c009e90bc3c1f1b0467669d3bcba7abdeee4426bc3f899b1d6c516f9ef692d8ed1172e671a3da463271d5edd0ce983ce66fd8ec83e1849eb17ad436e356348930ffb8e3d4a7e8fc4c2e42ab4e431f709f0c4ff3ae586d80e4edfb846680c86e21d2e7cf73b6928d92f692f225778dd1ccc8cefa721a83c45cb41bef090117a313468e30940700773f2b880c721f7c6331bc13eb83b48643b74cd446b5d17f4322cbd9a3f57c3e966677ccb63bb118"]) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f00000004c0)={0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000100)="140000001500055b925a802dd504811a0ffe4f90", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) sendfile(r2, r3, &(0x7f0000000080)=0x800, 0x0) [ 815.859535][ T7944] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000040000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 815.906700][ T7944] device bond0 left promiscuous mode [ 815.912164][ T7944] device bond_slave_0 left promiscuous mode [ 815.918170][ T7944] device bond_slave_1 left promiscuous mode 23:55:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000a10000000001000"}) 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5415, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:37 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3fc, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "00000000100000000000000a000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 815.977343][ T7994] affs: Unrecognized mount option "!%@" or missing value [ 815.984716][ T7994] affs: Error parsing options 23:55:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 816.071664][ T7994] affs: Unrecognized mount option "!%@" or missing value [ 816.079099][ T7994] affs: Error parsing options 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5416, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000b10000000001000"}) [ 816.115640][ T8016] device bond0 entered promiscuous mode [ 816.121301][ T8016] device bond_slave_0 entered promiscuous mode [ 816.127911][ T8016] device bond_slave_1 entered promiscuous mode [ 816.135402][ T8016] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 816.159412][ T8016] device bond0 left promiscuous mode 23:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000029000000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) fstat(r0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) syz_mount_image$bfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x2, 0x7, &(0x7f0000001600)=[{&(0x7f0000000280)="a47fccdbb32cce145b78cbc91ebd8e5c17b3e630dd3457acc5b78d2a2716233305d7a757a54804932683d8686e19d0ea4731145e9bf2eae93dd7b0866ff3625ac9efecf03b32ec10a0a5c8823696ea123417e8372f4432f79e293f871c524b95de9e0bfd5f8351880d41d6693d5e2e4997e567a8ad051b803a0170dc3df419a3f3e93c0f74624fcad624094087d0ae15d24756de4d0c2b51828e9dadf5fe76178583b74d6530474ef07219f6b82df8ab57bf7f8cc4", 0xb5, 0x2}, {&(0x7f0000000340)="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", 0x1000, 0xff}, {&(0x7f0000001340)="02a37b4f43af70ded8935058918de9b141b1933010e34f8845d5cfd3c099bd3595cc1f4e27f38287c7312b061a6f8e8d5ac5f41cbc0c36aa0f5346b1a3649f12d0eb054b8fad79e24e4718a98791cd2bb54f7a5f5ce9e7b59a0a8476756266092078a0eb817430bcc6a5ba83862e25edceb0", 0x72, 0x8000}, {&(0x7f00000013c0)="867bdb418823cbb25ac330c6a26ea88f522917c1730f3bc557e1233d4dd34d944509d551c804ae72c2055107e3740c8d295329549aca50", 0x37, 0x4}, {&(0x7f0000001400)="63a8d05617e5f9472d2ea6027f35a89ccd33cabd5519411953160b0800458b34dea3aebf95541ee46c7f307b5ffbe13ac5737d66f39cb2eda869cede30679a2e663c6463991e302f786657809620784577e0881db43edfaba2a12289543da19faf5d1a1bcd8a7e74f604b1c879e8445f8d7abc215ae901b195285ffff23e7f3dac66eb41d85c3ee9450e0944ed1659ce4f6ad76f049e9cb43b6950c7b9f8c707f91187dfee", 0xa5, 0x4}, {&(0x7f00000014c0)="cd21222b3f9ac9b500f3c9deaf7d5e38f591efb1754486a6db2ee256f01ee191f3743820a2d724e6eab28bee9d791d67ba7a6a6a118a95722f68422fe4bbe8d85a4f16f42fb273dc0d152918ae7fa5abab8b4f6975ce5b3175c43ab0d5", 0x5d, 0xfff}, {&(0x7f0000001540)="0a5de73d89169f4335efdd78362fce393b2c7787be5b55ba480e75d56f12924a22b0a3749ce7891c3af549fddd33f44fe817eb8da462f542284c25e580a4b62623f7139b8b2239c8a80e93b7fefe29ee11b6588e1433ed6b758459144f9942f52a177d110ecb5728129100c5e3edd758d875a8bba027dc41b5af09a412164b3bd8d7e7f4be1729284ba876efc89bec62959ad476a13f2f8bac003797d05b5851a214c89f962b61c3f2fdad5567f8fb135b6272368996fefea451ba7c5820dc7c", 0xc0, 0x100000001}], 0x800, &(0x7f0000001740)=ANY=[@ANYBLOB='.^,^{@,euid>', @ANYRESDEC=r1, @ANYBLOB="2c646f7c745f61707072616973652c7375626a5ff57365723d63616368653d6d6d70702c66736d616769633d307830303030303030303030263030303038bccd050ab2", @ANYRESDEC=r3, @ANYBLOB=',uid=', @ANYRESDEC=0xee01, @ANYBLOB=',euid<', @ANYRESDEC=0xee01, @ANYBLOB=',mask=^MAY_EXEC,hash,\x00']) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x22008, &(0x7f0000000180)={'trans=unix,', {[{@debug={'debug', 0x3d, 0x3}}, {@access_user}, {@cache_mmap}, {@fscache}], [{@permit_directio}]}}) [ 816.164948][ T8016] device bond_slave_0 left promiscuous mode [ 816.171227][ T8016] device bond_slave_1 left promiscuous mode 23:55:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000c10000000001000"}) 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5417, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xb000000}, 0x0) [ 816.296620][ T8038] affs: Unrecognized mount option "!%@" or missing value [ 816.303842][ T8038] affs: Error parsing options [ 816.316900][ T8016] device bond0 entered promiscuous mode [ 816.322620][ T8016] device bond_slave_0 entered promiscuous mode [ 816.329148][ T8016] device bond_slave_1 entered promiscuous mode [ 816.336674][ T8016] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000012540000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5418, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) [ 816.372995][ T8016] device bond0 left promiscuous mode [ 816.378333][ T8016] device bond_slave_0 left promiscuous mode [ 816.385125][ T8016] device bond_slave_1 left promiscuous mode [ 816.401249][ T8057] loop1: detected capacity change from 0 to 264192 23:55:37 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x3fd, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000d10000000001000"}) [ 816.425485][ T8057] BFS-fs: bfs_fill_super(): No BFS filesystem on loop1 (magic=7fa40000) 23:55:37 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000000}, 0x0) 23:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010020000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$smackfs_relabel_self(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, &(0x7f00000000c0)=0x4) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000100)={[{'!%@'}]}) 23:55:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541b, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) [ 816.578758][ T8081] device bond0 entered promiscuous mode [ 816.585236][ T8081] device bond_slave_0 entered promiscuous mode [ 816.591847][ T8081] device bond_slave_1 entered promiscuous mode [ 816.599308][ T8081] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 816.616997][ T8081] device bond0 left promiscuous mode [ 816.622584][ T8081] device bond_slave_0 left promiscuous mode 23:55:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000e10000000001000"}) 23:55:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010030000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 816.628910][ T8081] device bond_slave_1 left promiscuous mode [ 816.649292][ T8091] affs: Unrecognized mount option "!%@" or missing value [ 816.656866][ T8091] affs: Error parsing options 23:55:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541d, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xd000000}, 0x0) 23:55:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010040000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) [ 816.752958][ T8081] device bond0 entered promiscuous mode [ 816.758672][ T8081] device bond_slave_0 entered promiscuous mode [ 816.765017][ T8081] device bond_slave_1 entered promiscuous mode [ 816.771542][ T8081] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 816.794180][ T8081] device bond0 left promiscuous mode 23:55:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001010000000001000"}) [ 816.799537][ T8081] device bond_slave_0 left promiscuous mode [ 816.805722][ T8081] device bond_slave_1 left promiscuous mode 23:55:38 executing program 5: prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3, 0x9, &(0x7f0000000300)) mmap(&(0x7f0000430000/0x2000)=nil, 0x2000, 0x8, 0x11, 0xffffffffffffffff, 0x8000000) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = creat(&(0x7f0000000280)='./bus/file0\x00', 0x0) mount$fuseblk(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000004c0), 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB='=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,default_permissions,default_permissions,allow_other,\x00']) recvmsg$unix(r2, &(0x7f0000000d40)={&(0x7f0000000500), 0x6e, 0x0, 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="24000000000000000100000001000000", @ANYRES32, @ANYRES64=r2, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB, @ANYBLOB="0e17331db042bf96050f53cbc194e6ad1356797e", @ANYRES32, @ANYRESHEX, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESOCT=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESOCT=r2, @ANYRES32], 0x138}, 0x40016000) sendmsg$nl_route(r2, &(0x7f0000000640)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x44040}, 0x4000001) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x9, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x2, 0x300) r4 = socket(0x1, 0x803, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x20, 0x93, 0x4f, 0x7, 0x0, 0x754, 0x8000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x1, 0x0, 0x10480, 0xfffffffffffffffa, 0x9, 0x3, 0x40, 0xf545, 0x1, 0x0, @perf_bp, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x2, r5, 0xa) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000680)={&(0x7f0000003a80)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="20002abd7000fcdbdf2506000000440024d97ba7252c39c9cce1103383293536018014000200767863616e31000000000000000000140002007665746d0000000800010000000000000000000052ce34b6b1c9239993360800b026d9bc273ec7b18cb321bc9f37de3ca736fb31d8e92e6fbb68c8497a17fae734112f1114a9c228c5ce0a01e1445a1afcb30b719ffc", @ANYRES32=r5, @ANYBLOB="ea00011f000000000000020000000100000000", @ANYRES32=r1, @ANYBLOB="14e90080080003000200000408000100", @ANYRES32, @ANYRESDEC=r6], 0x6c}, 0x1, 0x0, 0x0, 0x20040054}, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000240)={@ipv4={'\x00', '\xff\xff', @multicast2}, 0x7d, r1}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r7, 0x89f0, &(0x7f00000001c0)={'ip6gre0\x00', &(0x7f0000000280)={'ip6_vti0\x00', r1, 0x29, 0x40, 0x80, 0xb53, 0x0, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7, 0x7800, 0x70000000, 0x10001}}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x500, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0xe4, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACVLAN_MODE={0x8, 0x1, 0x8}]}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r8}, @IFLA_WEIGHT={0x8, 0xf, 0xfe000000}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0x40ea}, @IFLA_IFALIAS={0x14, 0x14, 'veth1\x00'}, @IFLA_ADDRESS={0xa, 0x1, @local}, @IFLA_PROP_LIST={0x68, 0x34, 0x0, 0x1, [{0x14, 0x35, 'vlan0\x00'}, {0x14, 0x35, 'vxcan1\x00'}, {0x14, 0x35, 'bond_slave_1\x00'}, {0x14, 0x35, 'veth0_to_bridge\x00'}, {0x14, 0x35, 'veth0_vlan\x00'}]}]}, 0xe4}}, 0x0) 23:55:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$affs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) 23:55:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000005be706b04a5f7fb88a00000000000040000000000000000000a895b6f9d9fa00000013"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x541e, &(0x7f0000000000)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 23:55:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010050000001000"}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) 23:55:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 23:55:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001110000000001000"}) 23:55:38 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000000000000000000000000000001600"}) write$binfmt_aout(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e2a9848f12a5735b4019810ab343de839030388dc8cb7055ffe37f80c4b2be5e9190f4a87e8d577328add6c3451beb1089a"], 0x8d) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0xfff9, 0x0, 0x0, 0x9ffa, 0x0, "078cf0251c0e00"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000001210000000001000"}) [ 816.997686][ T8134] affs: No valid root block on device loop1 [ 817.028608][ T8136] device bond0 entered promiscuous mode [ 817.034312][ T8136] device bond_slave_0 entered promiscuous mode [ 817.040875][ T8136] device bond_slave_1 entered promiscuous mode 23:55:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 817.048480][ T8136] 8021q: adding VLAN 0 to HW filter on device macvlan2 23:55:38 executing program 1: perf_event_open(&(0x7f0000