f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xa000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:43 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) 03:02:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, 0x0}, 0x40) 03:02:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x4f, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1169.023998][T27533] hfs: can't find a HFS filesystem on dev loop5 03:02:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) 03:02:43 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x500, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) [ 1169.090315][T27533] hfs: can't find a HFS filesystem on dev loop5 03:02:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x50, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1169.230581][T27544] hfs: unable to parse mount options 03:02:43 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) 03:02:43 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:43 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) [ 1169.540855][T27558] 8021q: adding VLAN 0 to HW filter on device bond633 [ 1169.656542][T27544] hfs: unable to parse mount options [ 1169.657543][T27581] hfs: can't find a HFS filesystem on dev loop5 [ 1169.790506][T27581] hfs: can't find a HFS filesystem on dev loop5 [ 1169.801336][T27586] bond634 (uninitialized): Released all slaves 03:02:44 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xb000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:44 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) 03:02:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x51, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0}, 0x40) 03:02:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0xa00, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:44 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x9, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x52, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1170.083495][T27606] hfs: can't find a HFS filesystem on dev loop5 03:02:44 executing program 3: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xd, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) [ 1170.193674][T27610] hfs: unable to parse mount options [ 1170.234017][T27606] hfs: can't find a HFS filesystem on dev loop5 03:02:44 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xb, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 03:02:44 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1170.383019][T27613] 8021q: adding VLAN 0 to HW filter on device bond634 [ 1170.403041][T27626] hfs: can't find a HFS filesystem on dev loop3 03:02:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x53, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1170.643198][T27610] hfs: unable to parse mount options [ 1170.725277][T27640] hfs: can't find a HFS filesystem on dev loop5 [ 1170.794053][T27624] bond635 (uninitialized): Released all slaves [ 1170.803773][T27640] hfs: can't find a HFS filesystem on dev loop5 03:02:45 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xc000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0xf00, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 03:02:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x7, 0x0, &(0x7f0000000180)="c45c57ce395de5", 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 03:02:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x54, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:45 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:45 executing program 3: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:45 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x40) 03:02:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x55, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1171.105598][T27669] hfs: can't find a HFS filesystem on dev loop5 [ 1171.132380][T27674] hfs: unable to parse mount options [ 1171.268709][T27678] 8021q: adding VLAN 0 to HW filter on device bond635 [ 1171.312831][T27669] hfs: can't find a HFS filesystem on dev loop5 [ 1171.333261][T27677] hfs: can't find a HFS filesystem on dev loop3 03:02:45 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x56, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:45 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:46 executing program 4: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xc, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1171.532658][T27674] hfs: unable to parse mount options [ 1171.632344][T27695] bond636 (uninitialized): Released all slaves [ 1171.726929][T27698] hfs: can't find a HFS filesystem on dev loop5 03:02:46 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xe000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1171.831277][T27698] hfs: can't find a HFS filesystem on dev loop5 [ 1171.920204][T27713] hfs: can't find a HFS filesystem on dev loop4 03:02:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x2000, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:46 executing program 3: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x57, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:46 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1172.068948][T27725] hfs: unable to parse mount options 03:02:46 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 1172.148696][T27730] hfs: can't find a HFS filesystem on dev loop3 03:02:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x58, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1172.231460][T27734] 8021q: adding VLAN 0 to HW filter on device bond636 [ 1172.325395][T27736] hfs: can't find a HFS filesystem on dev loop5 03:02:46 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1172.431878][T27725] hfs: unable to parse mount options [ 1172.434139][T27736] hfs: can't find a HFS filesystem on dev loop5 03:02:47 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x23, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:47 executing program 3: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x5865, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1172.636370][T27744] bond637 (uninitialized): Released all slaves 03:02:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x59, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1172.788605][T27771] hfs: unable to parse mount options 03:02:47 executing program 4: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x4000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1172.918881][T27777] hfs: can't find a HFS filesystem on dev loop5 [ 1172.925517][T27771] 8021q: adding VLAN 0 to HW filter on device bond13 03:02:47 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xf000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1172.964778][T27771] bond13: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1172.990908][T27771] bond13: (slave ip6tnl1): Error -95 calling set_mac_address [ 1173.126774][T27789] hfs: unable to parse mount options [ 1173.153634][T27777] hfs: can't find a HFS filesystem on dev loop5 03:02:47 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x3f00, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5a, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1173.236059][T27801] 8021q: adding VLAN 0 to HW filter on device bond637 [ 1173.329793][T27789] hfs: unable to parse mount options [ 1173.378238][T27801] bond638 (uninitialized): Released all slaves [ 1173.424559][T27816] 8021q: adding VLAN 0 to HW filter on device bond11 03:02:48 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x23, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:48 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x10000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1173.580267][T27799] bond11: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1173.651638][T27799] bond11: (slave ip6tnl1): Error -95 calling set_mac_address 03:02:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5b, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1173.754212][T27828] hfs: can't find a HFS filesystem on dev loop5 [ 1173.764043][T27832] hfs: unable to parse mount options [ 1173.952612][T27835] hfs: can't find a HFS filesystem on dev loop3 [ 1174.053616][T27837] 8021q: adding VLAN 0 to HW filter on device bond638 03:02:48 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:48 executing program 4: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x2300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:48 executing program 3: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x900, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1174.256185][T27832] hfs: unable to parse mount options 03:02:48 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5c, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x4000, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1174.418070][T27859] hfs: can't find a HFS filesystem on dev loop5 [ 1174.464301][T27843] bond639 (uninitialized): Released all slaves 03:02:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1174.530286][T27869] hfs: unable to parse mount options [ 1174.543614][T27871] hfs: can't find a HFS filesystem on dev loop4 03:02:49 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x11000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1174.622465][T27859] hfs: can't find a HFS filesystem on dev loop5 03:02:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5e, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:49 executing program 4: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:49 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x60, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1174.772781][T27886] hfs: unable to parse mount options [ 1174.851549][T27869] 8021q: adding VLAN 0 to HW filter on device bond14 [ 1174.959972][T27903] hfs: can't find a HFS filesystem on dev loop5 [ 1174.968719][T27879] bond14: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 1175.016062][T27879] bond14: (slave ip6tnl1): Error -95 calling set_mac_address [ 1175.076620][T27907] hfs: can't find a HFS filesystem on dev loop4 [ 1175.087178][T27903] hfs: can't find a HFS filesystem on dev loop5 03:02:49 executing program 4: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x600, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:49 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1175.232567][T27897] 8021q: adding VLAN 0 to HW filter on device bond639 03:02:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be0", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:49 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5f, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1175.364613][T27886] hfs: unable to parse mount options [ 1175.462051][T27919] hfs: can't find a HFS filesystem on dev loop5 03:02:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0xe0ff, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1175.555070][T27925] hfs: unable to parse mount options [ 1175.558914][T27886] bond640 (uninitialized): Released all slaves [ 1175.571091][T27919] hfs: can't find a HFS filesystem on dev loop5 03:02:50 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x12000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:50 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1175.725090][T27934] 8021q: adding VLAN 0 to HW filter on device bond12 03:02:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x60, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1175.800959][T27925] bond12: (slave ip6tnl1): The slave device specified does not support setting the MAC address 03:02:50 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x5e, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1175.945529][T27955] hfs: can't find a HFS filesystem on dev loop5 [ 1175.958953][T27925] bond12: (slave ip6tnl1): Error -95 calling set_mac_address [ 1175.977788][T27960] hfs: unable to parse mount options 03:02:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x61, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1176.111213][T27966] 8021q: adding VLAN 0 to HW filter on device bond640 [ 1176.120275][T27955] hfs: can't find a HFS filesystem on dev loop5 [ 1176.139736][T27960] hfs: unable to parse mount options 03:02:50 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1176.298059][T27974] bond641 (uninitialized): Released all slaves 03:02:50 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:50 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:50 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x62, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:51 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x13000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$packet(0x11, 0x3, 0x300) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1176.657227][T27995] hfs: can't find a HFS filesystem on dev loop5 03:02:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:51 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$packet(0x11, 0x3, 0x300) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x10000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1176.734208][T27995] hfs: can't find a HFS filesystem on dev loop5 [ 1176.784788][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1176.791302][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1176.797983][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1176.804130][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:02:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x63, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$packet(0x11, 0x3, 0x300) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000300)={'ipvs\x00'}, &(0x7f0000000380)=0x1e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) bind$alg(0xffffffffffffffff, 0x0, 0x0) [ 1176.901240][T28008] 8021q: adding VLAN 0 to HW filter on device bond641 [ 1176.912928][T28002] hfs: unable to parse mount options 03:02:51 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:51 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x64, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1177.159931][T28002] hfs: unable to parse mount options 03:02:51 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socket$packet(0x11, 0x3, 0x300) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x10000, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000300)={'ipvs\x00'}, &(0x7f0000000380)=0x1e) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) bind$alg(0xffffffffffffffff, 0x0, 0x0) pipe2$9p(0x0, 0x0) [ 1177.215121][T28032] hfs: can't find a HFS filesystem on dev loop5 03:02:51 executing program 3 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x2, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1177.271872][T28008] bond642 (uninitialized): Released all slaves [ 1177.356033][T28032] hfs: can't find a HFS filesystem on dev loop5 03:02:52 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x14000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x65, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1177.535481][T28051] FAULT_INJECTION: forcing a failure. [ 1177.535481][T28051] name failslab, interval 1, probability 0, space 0, times 0 [ 1177.566162][T28051] CPU: 0 PID: 28051 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1177.574863][T28051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 03:02:52 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1177.584928][T28051] Call Trace: [ 1177.588269][T28051] dump_stack+0x11d/0x181 [ 1177.592660][T28051] should_fail.cold+0xa/0x1a [ 1177.597266][T28051] __should_failslab+0xee/0x130 [ 1177.602129][T28051] should_failslab+0x9/0x14 [ 1177.606642][T28051] __kmalloc+0x53/0x690 [ 1177.610808][T28051] ? __rcu_read_unlock+0x66/0x3d0 [ 1177.615833][T28051] ? __sanitizer_cov_trace_pc+0x14/0x50 [ 1177.621376][T28051] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1177.627267][T28051] ? bpf_test_init.isra.0+0xa3/0x240 [ 1177.632618][T28051] bpf_test_init.isra.0+0xa3/0x240 [ 1177.637727][T28051] bpf_prog_test_run_skb+0x7a/0x8a0 [ 1177.642916][T28051] ? fput_many+0xec/0x130 [ 1177.647239][T28051] ? fput+0x29/0x30 [ 1177.651075][T28051] ? __bpf_prog_get+0x8f/0x1c0 [ 1177.655841][T28051] ? bpf_test_init.isra.0+0x240/0x240 [ 1177.661213][T28051] __do_sys_bpf+0xf77/0x3150 [ 1177.665805][T28051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1177.672032][T28051] ? __this_cpu_preempt_check+0x45/0x140 [ 1177.677696][T28051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1177.683932][T28051] ? __sb_end_write+0xbe/0x100 [ 1177.688741][T28051] __x64_sys_bpf+0x4c/0x60 [ 1177.693179][T28051] do_syscall_64+0xcc/0x3a0 [ 1177.697680][T28051] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1177.703586][T28051] RIP: 0033:0x45af49 [ 1177.707538][T28051] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1177.727133][T28051] RSP: 002b:00007ff811c5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1177.735537][T28051] RAX: ffffffffffffffda RBX: 00007ff811c5fc90 RCX: 000000000045af49 [ 1177.743593][T28051] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 1177.751555][T28051] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1177.759555][T28051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff811c606d4 [ 1177.767519][T28051] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 0000000000000005 03:02:52 executing program 4: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1177.924298][T28063] hfs: unable to parse mount options 03:02:52 executing program 3 (fault-call:3 fault-nth:1): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x66, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1178.000149][T28067] hfs: can't find a HFS filesystem on dev loop5 [ 1178.160581][T28079] FAULT_INJECTION: forcing a failure. [ 1178.160581][T28079] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.181339][T28079] CPU: 1 PID: 28079 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1178.190020][T28079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1178.200059][T28079] Call Trace: [ 1178.203351][T28079] dump_stack+0x11d/0x181 [ 1178.207728][T28079] should_fail.cold+0xa/0x1a [ 1178.212406][T28079] __should_failslab+0xee/0x130 [ 1178.217264][T28079] should_failslab+0x9/0x14 [ 1178.220925][T28063] 8021q: adding VLAN 0 to HW filter on device bond642 [ 1178.221817][T28079] kmem_cache_alloc_trace+0x2a/0x5d0 [ 1178.233852][T28079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.240160][T28079] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1178.246487][T28079] bpf_prog_test_run_skb+0x132/0x8a0 [ 1178.251777][T28079] ? fput_many+0xec/0x130 [ 1178.256109][T28079] ? __bpf_prog_get+0x8f/0x1c0 [ 1178.260872][T28079] ? bpf_test_init.isra.0+0x240/0x240 [ 1178.266424][T28079] __do_sys_bpf+0xf77/0x3150 [ 1178.271049][T28079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.277285][T28079] ? __this_cpu_preempt_check+0x45/0x140 [ 1178.282917][T28079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.289151][T28079] ? __sb_end_write+0xbe/0x100 [ 1178.294018][T28079] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1178.300352][T28079] __x64_sys_bpf+0x4c/0x60 [ 1178.304796][T28079] do_syscall_64+0xcc/0x3a0 [ 1178.309320][T28079] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1178.315215][T28079] RIP: 0033:0x45af49 [ 1178.319208][T28079] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1178.338811][T28079] RSP: 002b:00007ff811c5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1178.347224][T28079] RAX: ffffffffffffffda RBX: 00007ff811c5fc90 RCX: 000000000045af49 03:02:52 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x3, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1178.355193][T28079] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 1178.363235][T28079] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1178.371193][T28079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff811c606d4 [ 1178.379232][T28079] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 0000000000000005 [ 1178.394183][T28067] hfs: can't find a HFS filesystem on dev loop5 03:02:53 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x67, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:53 executing program 3 (fault-call:3 fault-nth:2): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x4, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1178.525768][T28063] hfs: unable to parse mount options [ 1178.595931][T28080] hfs: can't find a HFS filesystem on dev loop4 [ 1178.602394][T28086] bond643 (uninitialized): Released all slaves 03:02:53 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x2d0a29ae, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:53 executing program 4 (fault-call:3 fault-nth:0): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:53 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x68, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1178.926637][T28114] FAULT_INJECTION: forcing a failure. [ 1178.926637][T28114] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.002998][T28114] CPU: 0 PID: 28114 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1179.011707][T28114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.021772][T28114] Call Trace: [ 1179.025071][T28114] dump_stack+0x11d/0x181 [ 1179.029473][T28114] should_fail.cold+0xa/0x1a [ 1179.034114][T28114] __should_failslab+0xee/0x130 [ 1179.038971][T28114] should_failslab+0x9/0x14 [ 1179.043585][T28114] kmem_cache_alloc+0x29/0x5d0 [ 1179.048361][T28114] __build_skb+0x3b/0x80 [ 1179.052603][T28114] build_skb+0x3d/0x190 [ 1179.056826][T28114] bpf_prog_test_run_skb+0x1a5/0x8a0 [ 1179.062165][T28114] ? fput_many+0xec/0x130 [ 1179.066553][T28114] ? __bpf_prog_get+0x8f/0x1c0 [ 1179.071307][T28114] ? bpf_test_init.isra.0+0x240/0x240 [ 1179.076675][T28114] __do_sys_bpf+0xf77/0x3150 [ 1179.081261][T28114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.087494][T28114] ? __this_cpu_preempt_check+0x45/0x140 [ 1179.093181][T28114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.099470][T28114] ? __sb_end_write+0xbe/0x100 [ 1179.104285][T28114] __x64_sys_bpf+0x4c/0x60 [ 1179.108737][T28114] do_syscall_64+0xcc/0x3a0 [ 1179.113351][T28114] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1179.119323][T28114] RIP: 0033:0x45af49 [ 1179.123216][T28114] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1179.142868][T28114] RSP: 002b:00007ff811c5fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1179.151416][T28114] RAX: ffffffffffffffda RBX: 00007ff811c5fc90 RCX: 000000000045af49 [ 1179.159383][T28114] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 1179.167350][T28114] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1179.175328][T28114] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff811c606d4 [ 1179.183291][T28114] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 0000000000000005 [ 1179.199225][T28115] hfs: can't find a HFS filesystem on dev loop5 03:02:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x7, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1179.261491][T28127] FAULT_INJECTION: forcing a failure. [ 1179.261491][T28127] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.312848][T28126] hfs: unable to parse mount options [ 1179.363291][T28127] CPU: 1 PID: 28127 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1179.372096][T28127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1179.382154][T28127] Call Trace: [ 1179.385440][T28127] dump_stack+0x11d/0x181 [ 1179.389795][T28127] should_fail.cold+0xa/0x1a [ 1179.394404][T28127] __should_failslab+0xee/0x130 [ 1179.399403][T28127] should_failslab+0x9/0x14 [ 1179.403905][T28127] __kmalloc+0x53/0x690 [ 1179.408146][T28127] ? __rcu_read_unlock+0x66/0x3d0 [ 1179.413208][T28127] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1179.419136][T28127] ? bpf_test_init.isra.0+0xa3/0x240 [ 1179.424471][T28127] bpf_test_init.isra.0+0xa3/0x240 [ 1179.429578][T28127] bpf_prog_test_run_skb+0x7a/0x8a0 [ 1179.434769][T28127] ? fput_many+0xec/0x130 [ 1179.439152][T28127] ? fput+0x29/0x30 [ 1179.443017][T28127] ? __bpf_prog_get+0x8f/0x1c0 [ 1179.447850][T28127] ? bpf_test_init.isra.0+0x240/0x240 [ 1179.453271][T28127] __do_sys_bpf+0xf77/0x3150 [ 1179.457874][T28127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.464108][T28127] ? __this_cpu_preempt_check+0x45/0x140 [ 1179.469736][T28127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1179.476004][T28127] ? __sb_end_write+0xbe/0x100 [ 1179.480811][T28127] __x64_sys_bpf+0x4c/0x60 [ 1179.485235][T28127] do_syscall_64+0xcc/0x3a0 [ 1179.489746][T28127] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1179.495640][T28127] RIP: 0033:0x45af49 [ 1179.499553][T28127] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1179.519184][T28127] RSP: 002b:00007fdc96dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1179.527633][T28127] RAX: ffffffffffffffda RBX: 00007fdc96dc7c90 RCX: 000000000045af49 [ 1179.535596][T28127] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 1179.543626][T28127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1179.551653][T28127] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdc96dc86d4 [ 1179.559611][T28127] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 0000000000000005 03:02:54 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:54 executing program 3 (fault-call:3 fault-nth:3): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1179.672379][T28133] 8021q: adding VLAN 0 to HW filter on device bond643 03:02:54 executing program 4 (fault-call:3 fault-nth:1): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1179.776836][T28145] hfs: can't find a HFS filesystem on dev loop5 03:02:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x9, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1179.925311][T28155] FAULT_INJECTION: forcing a failure. [ 1179.925311][T28155] name failslab, interval 1, probability 0, space 0, times 0 [ 1179.939358][T28126] hfs: unable to parse mount options 03:02:54 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xa, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x69, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1180.044045][T28141] bond644 (uninitialized): Released all slaves [ 1180.050662][T28155] CPU: 0 PID: 28155 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1180.059350][T28155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.069438][T28155] Call Trace: [ 1180.072727][T28155] dump_stack+0x11d/0x181 [ 1180.077075][T28155] should_fail.cold+0xa/0x1a [ 1180.081716][T28155] __should_failslab+0xee/0x130 [ 1180.086586][T28155] should_failslab+0x9/0x14 [ 1180.091145][T28155] kmem_cache_alloc_trace+0x2a/0x5d0 [ 1180.096443][T28155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.102720][T28155] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1180.109044][T28155] bpf_prog_test_run_skb+0x132/0x8a0 [ 1180.114329][T28155] ? fput_many+0xec/0x130 [ 1180.118662][T28155] ? __bpf_prog_get+0x8f/0x1c0 [ 1180.123480][T28155] ? bpf_test_init.isra.0+0x240/0x240 [ 1180.128845][T28155] __do_sys_bpf+0xf77/0x3150 [ 1180.133431][T28155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.139670][T28155] ? __this_cpu_preempt_check+0x45/0x140 [ 1180.145314][T28155] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.151543][T28155] ? __sb_end_write+0xbe/0x100 [ 1180.156341][T28155] __x64_sys_bpf+0x4c/0x60 [ 1180.160826][T28155] do_syscall_64+0xcc/0x3a0 [ 1180.165510][T28155] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1180.171438][T28155] RIP: 0033:0x45af49 [ 1180.175332][T28155] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1180.194922][T28155] RSP: 002b:00007fdc96dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1180.203363][T28155] RAX: ffffffffffffffda RBX: 00007fdc96dc7c90 RCX: 000000000045af49 [ 1180.211429][T28155] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 1180.219393][T28155] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1180.227352][T28155] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdc96dc86d4 [ 1180.235371][T28155] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 0000000000000005 03:02:54 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:54 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:54 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x3f000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:54 executing program 4 (fault-call:3 fault-nth:2): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1180.457158][T28175] hfs: can't find a HFS filesystem on dev loop5 [ 1180.469669][T28180] FAULT_INJECTION: forcing a failure. [ 1180.469669][T28180] name failslab, interval 1, probability 0, space 0, times 0 03:02:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x6a, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1180.554036][T28180] CPU: 1 PID: 28180 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 1180.562769][T28180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1180.572814][T28180] Call Trace: [ 1180.576110][T28180] dump_stack+0x11d/0x181 [ 1180.580531][T28180] should_fail.cold+0xa/0x1a [ 1180.585181][T28180] __should_failslab+0xee/0x130 [ 1180.590137][T28180] should_failslab+0x9/0x14 [ 1180.594648][T28180] kmem_cache_alloc+0x29/0x5d0 [ 1180.599414][T28180] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1180.605156][T28180] ? map_id_range_down+0x134/0x210 [ 1180.610279][T28180] ? memcg_kmem_put_cache+0x7c/0xc0 [ 1180.615478][T28180] __build_skb+0x3b/0x80 [ 1180.619749][T28180] build_skb+0x3d/0x190 [ 1180.624001][T28180] bpf_prog_test_run_skb+0x1a5/0x8a0 [ 1180.629333][T28180] ? fput_many+0xec/0x130 [ 1180.633671][T28180] ? __bpf_prog_get+0x8f/0x1c0 [ 1180.638435][T28180] ? bpf_test_init.isra.0+0x240/0x240 [ 1180.643899][T28180] __do_sys_bpf+0xf77/0x3150 [ 1180.648489][T28180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.654753][T28180] ? __this_cpu_preempt_check+0x45/0x140 [ 1180.660410][T28180] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1180.666650][T28180] ? __sb_end_write+0xbe/0x100 [ 1180.671492][T28180] __x64_sys_bpf+0x4c/0x60 [ 1180.675907][T28180] do_syscall_64+0xcc/0x3a0 [ 1180.680422][T28180] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1180.686331][T28180] RIP: 0033:0x45af49 03:02:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xe, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:55 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x900, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1180.690230][T28180] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1180.709910][T28180] RSP: 002b:00007fdc96dc7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1180.718320][T28180] RAX: ffffffffffffffda RBX: 00007fdc96dc7c90 RCX: 000000000045af49 [ 1180.726300][T28180] RDX: 0000000000000028 RSI: 0000000020000280 RDI: 000000000000000a [ 1180.732085][T28189] hfs: unable to parse mount options [ 1180.734487][T28180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1180.734499][T28180] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdc96dc86d4 [ 1180.734509][T28180] R13: 00000000004c15ad R14: 00000000004d66a0 R15: 0000000000000005 03:02:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x6b, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x6c, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1181.000769][T28198] hfs: can't find a HFS filesystem on dev loop5 03:02:55 executing program 4 (fault-call:3 fault-nth:3): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1181.062071][T28195] 8021q: adding VLAN 0 to HW filter on device bond644 03:02:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x11, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:55 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1181.298590][T28189] hfs: unable to parse mount options [ 1181.474913][T28195] bond645 (uninitialized): Released all slaves 03:02:56 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x40000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:56 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x18, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x6d, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1181.778760][T28267] hfs: unable to parse mount options 03:02:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x6e, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x29, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1181.924175][T28273] 8021q: adding VLAN 0 to HW filter on device bond645 [ 1181.929045][T28257] hfs: can't find a HFS filesystem on dev loop5 [ 1182.012791][T28267] hfs: unable to parse mount options 03:02:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x60, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1182.097293][T28273] bond646 (uninitialized): Released all slaves 03:02:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:56 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x60000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:56 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:56 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xe0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x6f, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1182.422721][T28309] hfs: unable to parse mount options 03:02:56 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1182.501759][T28315] 8021q: adding VLAN 0 to HW filter on device bond646 03:02:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1182.682069][T28309] hfs: unable to parse mount options [ 1182.811963][T28330] hfs: can't find a HFS filesystem on dev loop5 [ 1182.840565][T28337] bond647 (uninitialized): Released all slaves 03:02:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xf0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x70, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:57 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x65580000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:57 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:57 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:57 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x300, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1183.263816][T28370] hfs: unable to parse mount options 03:02:57 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:57 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x71, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1183.442141][T28375] hfs: can't find a HFS filesystem on dev loop5 [ 1183.451601][T28370] 8021q: adding VLAN 0 to HW filter on device bond647 03:02:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1183.540663][T28370] hfs: unable to parse mount options [ 1183.626760][T28383] bond648 (uninitialized): Released all slaves 03:02:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x700, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:58 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xf95, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:58 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x81000000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x72, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1183.988963][T28425] hfs: unable to parse mount options 03:02:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1184.123934][T28425] 8021q: adding VLAN 0 to HW filter on device bond648 03:02:58 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x900, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:58 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x102, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:02:58 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1184.251466][T28425] hfs: unable to parse mount options 03:02:58 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1184.303162][T28423] hfs: can't find a HFS filesystem on dev loop5 [ 1184.476295][T28453] bond649 (uninitialized): Released all slaves 03:02:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xa00, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:59 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x88a8ffff, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:02:59 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:02:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x103, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1184.844322][T28488] hfs: unable to parse mount options 03:02:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xe00, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1185.048923][T28492] hfs: can't find a HFS filesystem on dev loop5 [ 1185.056093][T28488] 8021q: adding VLAN 0 to HW filter on device bond649 03:02:59 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x104, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1185.173881][T28488] hfs: unable to parse mount options 03:02:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x1100, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:02:59 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:02:59 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1185.348238][T28505] bond650 (uninitialized): Released all slaves 03:03:00 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x9effffff, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:00 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x107, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1185.709131][T28548] hfs: unable to parse mount options 03:03:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x1528, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1185.849635][T28548] 8021q: adding VLAN 0 to HW filter on device bond650 03:03:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1186.020165][T28548] hfs: unable to parse mount options 03:03:00 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x109, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1186.160489][T28564] bond651 (uninitialized): Released all slaves 03:03:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:00 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xae290a2d, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1186.347595][T28545] hfs: can't find a HFS filesystem on dev loop5 03:03:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:01 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x1800, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x10a, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1186.493051][T28604] hfs: unable to parse mount options [ 1186.658570][T28604] 8021q: adding VLAN 0 to HW filter on device bond651 03:03:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x2000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1186.771138][T28604] hfs: unable to parse mount options 03:03:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x10e, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1186.846059][T28611] bond652 (uninitialized): Released all slaves 03:03:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:01 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xf0ffffff, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:01 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x78) [ 1187.220527][T28656] hfs: unable to parse mount options 03:03:01 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x2815, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:01 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x111, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:01 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1187.366239][T28656] 8021q: adding VLAN 0 to HW filter on device bond652 03:03:02 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:02 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x200002a8) [ 1187.616318][T28656] hfs: unable to parse mount options 03:03:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x118, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1187.725957][T28670] bond653 (uninitialized): Released all slaves 03:03:02 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) lseek(r1, 0x8001, 0x2) fcntl$setstatus(r0, 0x4, 0x42000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x2900, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:02 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xfeff0000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:02 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x160, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1188.132770][T28718] hfs: unable to parse mount options 03:03:02 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1188.387687][T28723] 8021q: adding VLAN 0 to HW filter on device bond653 03:03:02 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x3f00, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1188.521316][T28718] hfs: unable to parse mount options [ 1188.577413][T28734] bond654 (uninitialized): Released all slaves [ 1188.597699][T28698] hfs: can't find a HFS filesystem on dev loop5 03:03:03 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2300, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:03 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c637a00000000", 0x0, 0xef, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0xffffffffffffff99) 03:03:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x1e0, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf0, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:03 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xff0f0000, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:03 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000100)=""/8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000800)=ANY=[@ANYBLOB="b702000004000080bfa30000000000800703000000feffff7a0af0fff8ffffff79a4f0ff00008000b7060000ffffffff6d6405000000000065040400010002000404000001000000b70500000000000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd8010002be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b422db0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90ef17f95a25780c3a057844290eef4e9182ec8164f0462cbc8626daf5e78e54042f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897ac401be75a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb6de93dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f0112adebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d4ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c76601000000000000cbeebf87c69c68da6473a57bafa950ddda6eb109a31c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f6010000000000a8cf0a0907c1ff56118b52504019ceacdc158ca863e2b56e3f5fa45c273b4cbed91951eccc51bd64424ab2ace4acd90f1d1eb64414a6df4009f74f0cc6ae64162284a2416a1827005a00"/821], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1188.980229][T28772] hfs: unable to parse mount options 03:03:03 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x4000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x2, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:03 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x500, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:03 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sync_file_range(r1, 0x8, 0x0, 0x6) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1189.252838][T28772] 8021q: adding VLAN 0 to HW filter on device bond654 03:03:03 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xf0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1189.402486][T28771] hfs: can't find a HFS filesystem on dev loop5 [ 1189.421883][T28772] hfs: unable to parse mount options 03:03:04 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xf000, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x6000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:04 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xffffa888, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xf0ffff, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:04 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0xa00, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1190.101566][T28842] hfs: unable to parse mount options 03:03:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xe0ff, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:04 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x1000000, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:04 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffc7d, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x1, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r3, 0x4038ae7a, &(0x7f0000000140)={0x1, 0x15e, &(0x7f00000000c0)="f294d3f3a91aa1884221eee997bfec7081ac49b7c79f92897cc807faa682a6938ca9e46893dda34af337f081578261de76e9787a243214848df11a861f9489cba1a2724fdfeac9347954d0b96cf56f218122f899321a0cb9edf733fc69c201e2cb46c143", &(0x7f00000007c0)="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", 0x64, 0x1000}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={0xffffffffffffffff}) fcntl$F_SET_RW_HINT(r4, 0x40c, &(0x7f00000003c0)) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TCSBRKP(r11, 0x5425, 0x100) r12 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r9, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)={0x20, r12, 0x201, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0x20}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r6, &(0x7f00000017c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, r12, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x1) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r14, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)=0x0) r16 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r16, 0x4, 0x42800) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x9, 0x5, 0x3, 0x7, 0x0, 0x4, 0x1000, 0x4, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20, 0x2, @perf_config_ext={0x200, 0xca49}, 0x8, 0x80, 0x255, 0x6, 0x400, 0x6}, r15, 0x4, r16, 0x5) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/733], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r17, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1190.418457][T28842] 8021q: adding VLAN 0 to HW filter on device bond655 03:03:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x2000000, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1190.623511][T28842] hfs: unable to parse mount options 03:03:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xf000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1190.792747][T28858] bond656 (uninitialized): Released all slaves 03:03:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x4000080, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:05 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'netpci0\x00', @ifru_names='bond_slave_1\x00'}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0xf00, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:05 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xffffff7f, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xffe0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:05 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x80000004, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1191.461849][T28914] hfs: unable to parse mount options 03:03:06 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = memfd_create(&(0x7f000003e000)='\'', 0x0) r3 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r4 = dup2(r3, r2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x80045301, &(0x7f00000001c0)) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x18100, 0x0) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r7, @ANYBLOB="5700000081a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46820ecabca1e1ba165993cba605bd1"], 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000000c0)={r7, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000400)={r7, 0x88, "83bcf0be4e89004b1933552a8bb2f5ff9620a973e28ff580d461da853b8dc998daa1e4e570291e422e402533815ee0acc7913ee2ce73651368ea4aaf03789c9f73eef21f05e8310403164b7aca87feb47b2c73c57aad2d6ce505140aa051d877fe06cac1fcc7b9c0956189f61a665193d9f0750d401ca541518287af4152451385a7232a9e95935f"}, &(0x7f0000000080)=0x90) sendmsg$inet_sctp(r1, &(0x7f00000018c0)={&(0x7f0000000480)=@in6={0xa, 0x4e23, 0x7fff, @loopback, 0x20}, 0x1c, &(0x7f00000017c0)=[{&(0x7f00000004c0)="529b0d93f5745589e7daa5c4d9c63d3d135a9a9aa3da2dae3b2cbe4f15d6ee85e339a27f69cae1d311f688c87491c6", 0x2f}, {&(0x7f0000000500)="325fe0c1435c099f9f2c62078f18ddd9475f4f9f78649bd259a9037cb12d14eec3e285bcd7142c873aee944082926d2e793fe953ff4dc2f572042ee44d471f9577c74adad585923f37612ac71ff1d9e7b3", 0x51}, {&(0x7f0000000580)="abd8df4c97f4d9104c84d724e2b1", 0xe}, {&(0x7f00000005c0)="ac3fde03c314c5aeee", 0x9}, {&(0x7f0000000600)="7ad16074090df89f049a396249fa24de2abe6f8a820e1598509a9e4f289a180053f2da79069babb3088ae3c31c2795a11ec87dac28a0cfececac67d665d4b6ce3797558f581aaa062fc6919e30ab1f6a49adffa2eb6f2c04493411b7e26ebe6cd82f946f8a1568cad310675e2d12b0d281f2b50fd385ed0abcb5ec6475ffb65385d7144cfe75d4bf073a70cfd601f988da0f5b7365bcefbacbb9a14e0f118e17e6c9bb50d021d2fbfd77e9ce98324ee4db05838d9458e6b408b4c6fca612fd5cbc9337d50d04d274ef17fcdbde99e8c374cd5ac4d262dbc0cf17118ef083e1d40303b1b73a77976544834ba3057d715f65661b8fe42b7ae4", 0xf8}, {&(0x7f0000000700)="010b7fd3c542a848d7586ed4cf6172df4840583c0b7d3ce8c7f9902dd5a6d57573d2508195d9a9f6515daa5815809db299da1e3250e65a46d979e57063d82834c0bd4763ef206031cb55f18b0e9032db3d8aa5594b6adcde2af0044c98b16e2251d157cde727fea8f2e0b03f523b40da75258fe676f26bf69ae28faa7ebacf643c74d63bd754377d2114497555939eb688ba9ebbb15d28f44f3868c16cfb3eb59c0f25", 0xa3}, {&(0x7f00000007c0)="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", 0x1000}], 0x7, &(0x7f0000001840)=[@sndrcv={0x30, 0x84, 0x1, {0x7ff, 0xfe4, 0x4, 0x7bc, 0x7ff, 0x7, 0xffffd6c0, 0x8, r7}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x48, 0x4080}, 0x800) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0x8, &(0x7f0000000100)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=r0, @ANYRESOCT, @ANYRES16=r0], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xffffffff}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x8000}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r8, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0xb8, &(0x7f0000000040), &(0x7f0000000380)="0e08b1890bf5529a5a5f0056c87fad3c2afad810174d9db6bab908b47dcb5cce0aeb4e2ab651852a9752f7f64a14d5ee49f52e81f8de60b4ba5cfae3cd19b3bdfac091f2e7ce89d38f66370c2e0b17854c54b7f78f587a8f8fce0f7607d91f63d3790c83e9e0fba3543fd9a1be1cacf72168a8bcbc07d045f2a70da676af8702cfb629f6c0a8b0f69cd6d0388fe8cd058d6caf1b1e3783d883b4b8c4a828b763c7ba663c9ccb1cff98889bc6b7638083679c70d40bf56f8f"}, 0x40) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001980)=0x14) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r10, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_getoverrun(r10) getsockopt$inet6_opts(r9, 0x29, 0x37, &(0x7f00000002c0)=""/123, &(0x7f00000019c0)=0x7b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001900)='/dev/dlm-monitor\x00', 0x0, 0x0) write$capi20_data(r12, &(0x7f0000000440)={{0x10, 0x82c0, 0x8, 0x81, 0x5, 0xbe}}, 0x12) 03:03:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xfeffffff, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xf0ffff, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1191.778081][T28920] 8021q: adding VLAN 0 to HW filter on device bond656 03:03:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xfffff000, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1192.053603][T28914] hfs: unable to parse mount options 03:03:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xfffffffe, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:06 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4244, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1192.201199][T28927] bond657 (uninitialized): Released all slaves 03:03:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x1000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:06 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0xffffffff, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:06 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xffffff9e, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:07 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xd, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1192.645607][T28976] hfs: unable to parse mount options 03:03:07 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x2000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1192.763920][T28981] 8021q: adding VLAN 0 to HW filter on device bond657 [ 1192.933896][T28976] hfs: unable to parse mount options [ 1193.056800][T28981] bond658 (uninitialized): Released all slaves 03:03:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r0, 0x8c146000) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0xdb01d37ae32d578e, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000100)={0x1b, 0x2}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xfffffe41, 0x1e9, &(0x7f0000000180)="c45c00ce396ae5b2020f7d637a22", 0x0, 0xec, 0x0, 0x10314, 0x32e, &(0x7f0000000040), &(0x7f0000000380)="864cc541e40a6dc43140005dc762b40c70c73ddb6f8a2c67287ec21af5cb6638547e3111a0f8f6a59a75535463019e61ff9fdb066c475f777fea3be9fa66308842bdfa948200b8965f44d597fde41672568abb63148617f02aa27e614b4318d17525961483633dbe78fd3c7ca4af4ea328c02c2997cf558ef679417fa6aee60e2453c5e236ff52f131a3e345a30d5c9a36f53075d45dde8b9432b0c563959385da3b38b713438f317d6f11f78212e5c8ee0a482a5bd1df2c5e01a5abf388b4bc39fbf61dcd1ed549c7074bad81a5584817d65bdf4b8232c59da0b4d5"}, 0xfffffffffffffd90) 03:03:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xf0, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0xfffffff0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x3000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:09 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4442, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0xe0ff, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1194.790724][T29038] hfs: unable to parse mount options 03:03:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5b, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x195, 0x0, 0x0, 0xc, [], 0x0, 0xe, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0x5) set_mempolicy(0x0, &(0x7f00000000c0)=0x9, 0x3f) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/vmstat\x00', 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) ioctl$VIDIOC_G_FREQUENCY(r4, 0xc02c5638, &(0x7f0000000140)={0x5, 0x0, 0x4}) 03:03:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x1e9, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1194.928054][T29047] 8021q: adding VLAN 0 to HW filter on device bond658 03:03:09 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x4000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1195.082744][T29038] hfs: unable to parse mount options 03:03:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe80, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1195.197560][T29051] bond659 (uninitialized): Released all slaves 03:03:09 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:09 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0x2000018e, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:09 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x7000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:10 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) ioctl$FS_IOC_FIEMAP(r5, 0xc020660b, &(0x7f0000000380)={0x7fff, 0x8001, 0x3, 0x80, 0x3, [{0x0, 0xd470, 0xff, [], 0x5df1443ac2dab402}, {0xf9a, 0x401, 0x7fff, [], 0x1204}, {0x8, 0x7f060a68, 0xff, [], 0x400}]}) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r4}}, 0x20}}, 0x0) r8 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x2, &(0x7f00000004c0)=ANY=[@ANYRESDEC], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1000000}, 0xfffffffffffffe72, 0x10, &(0x7f0000000000)={0x5}, 0x10, 0x0, r8}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r9, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1195.603732][T29082] hfs: unable to parse mount options 03:03:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1195.771645][T29082] 8021q: adding VLAN 0 to HW filter on device bond659 03:03:10 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0xe, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1195.950607][T29082] hfs: unable to parse mount options 03:03:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1f0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1196.181787][T29110] bond660 (uninitialized): Released all slaves 03:03:10 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x9000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:10 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x2, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x2, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:10 executing program 3: r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:10 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="f05c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1196.403875][T29130] hfs: unable to parse mount options 03:03:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c4f057ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xa000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1196.614615][T29130] 8021q: adding VLAN 0 to HW filter on device bond660 03:03:11 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) ioctl$sock_netdev_private(r1, 0x89f1, &(0x7f00000000c0)="59abbd13a86070d8857c0d1636637639554d78089bb6e8c5547e0069895964fac8f11c8f41f994a515e448aa2e8c868cba7d43783f05dfa309ad250221b9262d48eaa9403d1bf3f68fb20f72ecb006f769b228475054f29a02cc5cb29df69024b38e8ba37fba2f610e44170ef53d3b") bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45cf0ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1196.814794][T29130] hfs: unable to parse mount options 03:03:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xe000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:11 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x3, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1197.001827][T29151] bond661 (uninitialized): Released all slaves 03:03:11 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57f0395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:11 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="850000000700000025000000000000009500000000000000a579753dec29fe276240f076750753bc7b952ab5ad939c403054d8465c13a24800a26b3c68ce084994e702d609331ab3c70aa6b030ed69efddccd23e793e8287051d4f5fef499e2a4ce758601229b94574e7825441222e81748b4ee09cc6fab89f552c75b3b144f5fc545ab790ef72fd2ca305f386142d783531ac34d0c99d62456cc766be4825548e08580000d70b991d746067c73f47457a8713e7b70a85bbdb07832000000000000000000000e680e667212bc3b0c353ebbffbc0b35e84e3db18dec7aa1862259d511d3f57d6a2737027d7f816ef8ac68ea2827824dbfaffea071b777a6f941ba359c46bf277811a07748aa6147edda46525e536d056847d9c00724ccfa99221c9b10f530749ff179657570a19d74527643e2e2b632fffbbb337eeeceb7fd1e5dd2e32e673ccc8b30c040000004dbd9542e6c49e87df53b578ba101b88651e6663d1626b2d05c9c9dcb0987af01ae2fe4da20c79018b0bd7348e4ec6747c58a9bb2479590df27190c1aee60272677e3c000000"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x3, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:11 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2a00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r5}}, 0x20}}, 0x0) sendmsg$IPSET_CMD_TYPE(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0xd, 0x6, 0x800, 0x70bd25, 0x5, {0x5, 0x0, 0x7}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x7}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x4000000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x8600, 0x0) dup2(r6, 0xffffffffffffffff) 03:03:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x4, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:11 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x11000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1197.392685][T29197] hfs: unable to parse mount options 03:03:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57cef05de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:12 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f00000000c0)={0x3b, @broadcast, 0x4e23, 0x4, 'none\x00', 0x10, 0x7, 0xe}, 0x2c) [ 1197.566132][T29204] 8021q: adding VLAN 0 to HW filter on device bond661 03:03:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x7, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce39f0e5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1197.687232][T29215] IPVS: set_ctl: invalid protocol: 59 255.255.255.255:20003 [ 1197.723709][T29197] hfs: unable to parse mount options [ 1197.860764][T29213] bond662 (uninitialized): Released all slaves 03:03:12 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000011000100000000080200000000000020", @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x20}}, 0x40000) write$binfmt_elf32(r2, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x3, 0x80, 0x0, 0x2, 0xc, 0x89, 0x2db, 0x38, 0xf3, 0x9fa, 0x1, 0x20, 0x1, 0x3, 0x400, 0xfffe}, [{0x6474e551, 0x0, 0x2, 0x3, 0xfe, 0x9d, 0x200, 0x3ff}, {0x10000001, 0x20, 0x8, 0x10000000, 0x3, 0x8000, 0x5b9, 0x8001}], "b39c4ecb9a303a5a7856aaab85668564d69adb860bbd3c5a85f0572a5552f6b2db6c917dcc934719eacf97cebf81fcf8659c5d5ae8fa9c242b02bb", [[], [], [], [], []]}, 0x5b3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f00000002c0)=0x4) 03:03:12 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x4d50, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:12 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x15280000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395df0b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:12 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x4, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:12 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x9, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5f0810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1198.202723][T29248] hfs: unable to parse mount options 03:03:12 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2f00f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b281f07d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1198.570885][T29263] 8021q: adding VLAN 0 to HW filter on device bond662 03:03:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x18000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xa, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1198.667356][T29248] hfs: unable to parse mount options 03:03:13 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x40, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)={0x0, 0xc3, "1dae9488717302b339ac8a2409f0db660665c2a4a00ff630d1ca4ed2adc56dc9946b8bdd3609bff40a59f5a5f8d7989535c7ff0fb904c466a5efe11abd4b18abe7fd7c27bcc2dfe9b93c3a4fdf30f3ec077f6a21cefaed3a9b104a5ba73816522dd216e480a579ddb2b4ea1c443282fd122cfbb18c8d443a0d2c4f429e65c3b5b43dbb0a49392f9621a9b2ffec43b3c5f19d6d1a3186f27fdcb84f6339e686d0ebfe79577838c7b726420780e5ec6789591fbb37ce8953915770836829e2ec0af2adac"}, &(0x7f0000000100)=0xcb) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x81, 0xc3, 0x4, 0x40, 0x6a32, 0xfffffffd, 0x4, 0x8, r2}, 0x20) r3 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) fallocate(r4, 0x20, 0x0, 0xfffffeff000) fallocate(r3, 0x20, 0x0, 0xfffffeff000) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc2, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x42000) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001940)='nl80211\x00') write$P9_RREMOVE(r0, &(0x7f0000002740)={0x7, 0x7b, 0x2}, 0x7) sendmsg$NL80211_CMD_SET_BEACON(r0, &(0x7f0000002540)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x10004002}, 0xc, &(0x7f0000002500)={&(0x7f0000001980)={0xb54, r9, 0x2, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_PROBE_RESP={0x275, 0x91, "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"}, @NL80211_ATTR_CIPHER_SUITES_PAIRWISE={0x28, 0x49, [0xfac0d, 0xfac01, 0xfac01, 0xfac08, 0xfac01, 0xfac0d, 0xfac00, 0xfac08, 0xfac08]}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}, @NL80211_ATTR_HIDDEN_SSID={0x8}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x1}, @NL80211_ATTR_EXTERNAL_AUTH_SUPPORT={0x4}, @NL80211_ATTR_BEACON_TAIL={0x884, 0xf, "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"}, @NL80211_ATTR_PBSS={0x4}]}, 0xb54}, 0x1, 0x0, 0x0, 0xa000}, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$P9_RSYMLINK(r11, &(0x7f0000002780)={0x14, 0x11, 0x1, {0x40, 0x3, 0x2}}, 0x14) write$FUSE_NOTIFY_DELETE(r8, &(0x7f0000002580)=ANY=[@ANYBLOB="37000000060000080005000000000000000e000000000000002f6465762f736e617073686f74000045024dcbd73ae8726c1784659c3333be3ea0f576cbc99df162c3fc28d48db50e8b0cb7cbc715be2b42d31974f2875ea2799475796e9a187a728d8a6f148ea018800bb99712611c5f5ed4eabada36cfc85eb6d8f91ecbadcd6cd154ffcfc6757f12a0656c1f79336cf114a2ecff8ec1a2084ea68d9be4c7bdc31abfb1cfe392a9425919440d8765522f72550a2dc500"/197], 0x37) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f00000007c0)={0x3, 0x3cdf5b0605ff034c, 0x4, 0x82200190, 0xc8, {0x77359400}, {0x1, 0x0, 0x4, 0x0, 0x4, 0x17, "e314a70e"}, 0x8, 0x0, @planes=&(0x7f0000000300)={0x1, 0x7, @userptr=0x7, 0x5}, 0x5, 0x0, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000480)={r12, &(0x7f0000000840)="af9577b877ce2b8f63fa2723af655a344daee65ada38257be99dd802a8f233ecc7f41bd43d83f857e86d2abbaf4d64dab02f27e5424c8d292722d649b43bbece1065e9cbe0667a9c965126d74b9749585415cc22bdbc9250042c5d518533c3f48d454821c7d8e7c38cc718af447592995b1b7b1293b5da9f80fe4ee91cd9f6827df3fe26927c077ed483c14783549530f7a53c0ca41645cdaf40389d17e5", &(0x7f0000000900)=""/4096, 0x4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r6, 0x0, 0xe, 0xffffffffffffff96, &(0x7f0000002680)="c45c57ce395de5b2810f7d637a22a933c3626f92147c3b46901d539e308a1e91046090648aa0288faa0e63d39cafd138800b58dde69c94f55a67e1c9c552da2d3341128de57e5044b51ff3d0ccacaaecd73978484377c76029448221e2e2bdda83b5eb8dfc104d176beba93f686c5d92cfbcbe711ce548082a9bb612b7b2aaf9aa69ac", 0x0, 0x2000f0, 0x0, 0xffffffffffffff7c, 0xffffffffffffff36, &(0x7f00000002c0)="887ee7aeea52861cdd2ec2aaad29247dbf2951e958c3c54e748a84b235b9eea020c7b0c307eff323d3ed49e6493d28f3fcc3"}, 0x10) [ 1198.796405][T29268] bond663 (uninitialized): Released all slaves 03:03:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810ff0637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1199.139311][ T27] audit: type=1800 audit(1579057393.629:130): pid=29292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17707 res=0 03:03:13 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xe, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:13 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x5, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x20000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7df07a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:13 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x2000, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) msgctl$IPC_RMID(r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1199.191385][ T27] audit: type=1800 audit(1579057393.649:131): pid=29293 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.3" name="bus" dev="sda1" ino=17707 res=0 03:03:13 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x504d, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1199.316239][T29315] hfs: unable to parse mount options 03:03:13 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d630522", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1199.457654][T29324] 8021q: adding VLAN 0 to HW filter on device bond663 03:03:14 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/731], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1199.577157][T29315] hfs: unable to parse mount options 03:03:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x29000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x11, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1199.666272][T29324] bond664 (uninitialized): Released all slaves 03:03:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d63f022", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:14 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000000)={0x0, 0x7, 0x0, 0xf912, 0x0, "f62fde96df2f8f4d"}) writev(r0, &(0x7f0000001440)=[{&(0x7f0000000180)="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", 0x2b9}], 0x1) set_tid_address(&(0x7f0000000140)) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x42000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x9, 0x2, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x4}, 0x10}, 0xfffffffffffffc26) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:14 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x6, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637af0", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:14 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x18, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:14 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x3f000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:14 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) getsockopt$sock_buf(r2, 0x1, 0x3b, &(0x7f0000000380)=""/206, &(0x7f00000000c0)=0xce) [ 1200.106916][T29364] hfs: unable to parse mount options 03:03:14 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x5354, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:14 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1200.317447][T29364] 8021q: adding VLAN 0 to HW filter on device bond664 03:03:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x3, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x40000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1200.632103][T29364] hfs: unable to parse mount options 03:03:15 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$NFNL_MSG_CTHELPER_DEL(0xffffffffffffffff, &(0x7f00000019c0)={&(0x7f0000001840), 0xc, &(0x7f0000001980)={&(0x7f0000001880)={0xf4, 0x2, 0x9, 0x420, 0x70bd29, 0x25dfdbff, {0x2, 0x0, 0x3}, [@NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x10}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x15}, @NFCTH_TUPLE={0x50, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x34}}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x4}]}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0xc}, @NFCTH_TUPLE={0x6c, 0x2, [@CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @broadcast}}}, @CTA_TUPLE_IP={0x14, 0x1, @ipv4={{0x8, 0x1, @loopback}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @ipv4={[], [], @empty}}}}]}, @NFCTH_POLICY={0xc, 0x4, {0x8, 0x5, 0x5}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x404}, 0x40000) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000001c0)='trusted.overlay.opaque\x00', &(0x7f0000000480)='y\x00', 0x2, 0x2) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000380)={0xe, {0x2, 0x73, 0x2, 0xb9, "32435050aa31aaa4fe6f9a232ffb22e90d0f658eeb6a5bac849c3ff7a19db23f3f3e2d91628057c830e084751b76fdd1c44f13b411525446f3e1dcfabfbc796ca0709426e5fe844fc429f9815de6371f79930ef22bf6a1651988789b04ed5d26fc44de097ddbaca936e1d2c48e2040dc00c42de5424801c462c96c97cfe7ca8a5289f18d6231df11e3e150b055a3ee3e528604c3ff98289021f573535631f6e08800fabf286fab7d1499bf69822ac6fa5bbedd7501007c5f2f"}}, 0xc5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001800)='/dev/vcsu\x00', 0x60300, 0x0) ioctl$TIOCSIG(r9, 0x40045436, 0x20) r10 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$UHID_INPUT(r10, &(0x7f00000007c0)={0x8, {"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", 0x1000}}, 0x1006) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket$netlink(0x10, 0x3, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r15, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r13, &(0x7f0000001bc0)={&(0x7f0000001a00), 0xc, &(0x7f0000001b80)={&(0x7f0000001a40)={0x138, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xfffffff9}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA={0x9c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xad}]}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9ad}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}]}, 0x138}, 0x1, 0x0, 0x0, 0x40}, 0x800) ioctl$VIDIOC_S_PRIORITY(r12, 0x40045644, 0x3) ioctl$DRM_IOCTL_AGP_ALLOC(r12, 0xc0206434, &(0x7f0000000100)={0x400000000000, 0x0, 0x10001, 0x81}) ioctl$DRM_IOCTL_SG_ALLOC(r7, 0xc0106438, &(0x7f0000000140)={0x80, r16}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r6, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x7f, 0x0, &(0x7f00000002c0)="bce96abc3f4a9ebb305ab4f4800c85cade07a2cfc7ed07752b004d6b5d902b20c0da2fb7aaeeaea4717a9840c36fa4523a8af8091988bf3b54615c96ae3d557ec93743d76e91899832267862f5a3cf7e20e23f0a1a499b8d20b656519b68c755bd39c17ac430998a6f20728c459a03d9fcfb78b8b705697c78bdc2a56257fc"}, 0x40) 03:03:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x60, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x4, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1200.771832][T29380] bond665 (uninitialized): Released all slaves 03:03:15 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x7, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xe0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x60000000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x5, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1201.139867][T29429] hfs: unable to parse mount options 03:03:15 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x6, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:15 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x5453, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xf0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:15 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xe0ffffff, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1201.401937][T29440] 8021q: adding VLAN 0 to HW filter on device bond665 03:03:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x300, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1201.543681][T29429] hfs: unable to parse mount options 03:03:16 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000900)={0x403, 0x7, 0x2, 0x401, 0x0, 0x8, 0xba1b, 0x3d, 0x0}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e21, 0x3, @mcast2, 0x8}}, 0x0, 0x800, 0x5, 0x0, 0x40}, &(0x7f0000000300)=0x98) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xffffffffffffff70, 0x1e9, &(0x7f00000000c0)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0xd0, &(0x7f0000000040)}, 0x28) r4 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x6, 0x204840) r5 = socket(0x10, 0x803, 0x0) openat$drirender128(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dri/renderD128\x00', 0x101000, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$DEVLINK_CMD_GET(r5, &(0x7f00000008c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x104000}, 0xc, &(0x7f0000000480)={&(0x7f00000007c0)={0xc4, 0x0, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}, @nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8, 0x1, 'pci\x00'}, {0x11, 0x2, '0000:00:10.0\x00'}}]}, 0xc4}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/qat_adf_ctl\x00', 0x400, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r6, 0xae04) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r4, 0x800455d1, &(0x7f0000000140)) 03:03:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x7, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xfeffffff, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1201.721506][T29452] bond666 (uninitialized): Released all slaves [ 1201.881682][T29474] QAT: Invalid ioctl 03:03:16 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x8, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:16 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x8, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1201.931667][T29484] QAT: Invalid ioctl 03:03:16 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x700, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1202.036128][T29488] hfs: unable to parse mount options 03:03:16 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCCONS(r2, 0x541d) fcntl$setstatus(r0, 0x4, 0x42000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0xfffffffffffffd6c}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r6, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x84daf02753bc7472) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r10}}, 0x20}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) r14 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r14, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r14, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r17, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) poll(&(0x7f00000000c0)=[{r4, 0x10}, {r7, 0xa01e095cb60088bd}, {r11}, {r14, 0x100}, {r15, 0x4a0c}], 0x5, 0x5) 03:03:16 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xfffff000, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1202.194377][T29488] 8021q: adding VLAN 0 to HW filter on device bond666 [ 1202.312080][T29488] hfs: unable to parse mount options 03:03:17 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x9, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x900, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xffffffe0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:17 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x9, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xa, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xa00, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1202.810665][T29536] hfs: unable to parse mount options 03:03:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = fcntl$dupfd(r0, 0x406, r0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000100)={0x1, 0x3, [{r1, 0x0, 0x1000000000000, 0x4000}, {r3, 0x0, 0x1000100002000, 0x1000}, {r4, 0x0, 0x1000000000000, 0x10000}]}) 03:03:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xb, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:17 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xfffffffe, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1202.989982][T29536] 8021q: adding VLAN 0 to HW filter on device bond667 03:03:17 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xe00, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:17 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xc, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1203.290117][T29536] hfs: unable to parse mount options [ 1203.386198][T29576] bond668 (uninitialized): Released all slaves 03:03:18 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:18 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x2, 0x0, 0xfb, 0x0, 0xf5b, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x1e}, 0x0, 0x0, 0x0, 0x9, 0x0, 0x5, 0x29}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) fcntl$setstatus(r1, 0x4, 0x42000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000480)={0x6, 0x118, 0xfa00, {{0x81, 0x10001, "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", 0x9, 0x24, 0x2, 0xfa, 0x2, 0x3, 0x1, 0x1}, r2}}, 0x120) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x5b, &(0x7f00000008c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000a1beb8028dbef1085358b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e380898c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a050000000000000033632152c58eaf302f0b2e0c252bb66762dbfa4177b5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18590d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c0ac4c5af1488694e7b2b10aa6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896dbe3321993d1eee2d7665b60d5e7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd957ff12d42513385e7013fa373f258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f6012811f30b036dbef6e3cb0dadbf9bd0fb1661702bcf357e691c18ca72922970e2beea6a265cb99d0c799d6c602cc1d1b77fd5027ca7d13ff1119c6bec103ffdc88b56a609448c42080130e948e30e7a089d0b567a402321b9dbc3e3f072797118835111001898e5a14f764ef23c3d70be836e573efe9ad3c794b0d498458f7bb67ab4c63c63132ec9497c759b90e4b1d764ecdaf43e42647d942c9e401e513b0d967d61f7e7d8a1af20cdeced1ef694c9ae29d6fb7635edc61d6819f29b28dd04ed6679f277f9e44b6f7172ec1c8a626f7382ab27d1a7df8991f8616512b24628cd"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x800}, 0x10}, 0x59) sendfile(r1, r3, 0x0, 0x7) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x800, 0x0) connect$pppl2tp(r4, &(0x7f0000000600)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x1, 0x1, {0xa, 0x4e23, 0x1, @mcast2, 0x81}}}, 0x32) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000003c0)={@l2tp6={0xa, 0x0, 0x0, @rand_addr="15ac503a47416e70e98108add59db493", 0x7e14}, {&(0x7f00000001c0)=""/185, 0xb9}, &(0x7f0000000140), 0x31}, 0xa0) 03:03:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x1100, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:18 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0xffffffff, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xd, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:18 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0xa, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1203.734088][T29592] hfs: unable to parse mount options 03:03:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0xffffffffffffffff}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xe, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1203.953939][T29592] 8021q: adding VLAN 0 to HW filter on device bond668 03:03:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x1800, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:18 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x1000}, 0x16, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1204.066518][T29592] hfs: unable to parse mount options 03:03:18 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x10, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1204.260964][T29613] bond669 (uninitialized): Released all slaves [ 1204.624157][T29600] hfs: can't find a HFS filesystem on dev loop5 03:03:19 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000100)={0x10000, 0x67d, 0x6}) 03:03:19 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0xb, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x11, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x2000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1204.802374][T29652] hfs: unable to parse mount options 03:03:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r2, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x4c, 0x15, 0xa, 0x300, 0x70bd2a, 0x25dfdbff, {0xa, 0x0, 0x8}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x12, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1204.923528][T29652] 8021q: adding VLAN 0 to HW filter on device bond669 [ 1205.085251][T29652] hfs: unable to parse mount options 03:03:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:19 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x6000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:19 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x13, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:19 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000300}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x20, 0x70bd2d, 0x25dfdbfc}, 0x14}}, 0x40) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r5, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x40, 0x0, 0x8, 0x0, 0x70bd2c, 0x25dfdbfc, {0x5, 0x0, 0x1}, [@CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x80000000}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x1ff}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x400}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x4}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x4004000}, 0x10000001) 03:03:20 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:20 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0xc, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x3, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x14, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xe0ff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x15, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x4, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1205.980214][T29719] hfs: unable to parse mount options 03:03:20 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xfffffffffffffe75, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000007c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r4, &(0x7f0000000840)={0x1, 0x10, 0xfa00, {&(0x7f0000000780), r5}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r3, 0xc0585611, &(0x7f0000000100)={0x4, 0x0, 0x4, 0xe000, 0x2, {0x77359400}, {0x3, 0x0, 0x40, 0xe9, 0x1f, 0xa8, "ff19944a"}, 0x3317aadc, 0x8b01710b2504402c, @planes=&(0x7f00000000c0)={0x52, 0x10000, @fd, 0x5}, 0x2, 0x0, 0xffffffffffffffff}) write$P9_RSTAT(r6, &(0x7f00000002c0)={0x58, 0x7d, 0x1, {0x0, 0x51, 0x8, 0x278a0, {0x40, 0x2, 0x1}, 0x20808000, 0xe2, 0x0, 0x331, 0xa, 'syzkaller\x00', 0x6, 'vmnet1', 0xa, 'syzkaller\x00', 0x4, 'ppp0'}}, 0x58) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:20 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xf000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x16, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1206.187344][T29725] 8021q: adding VLAN 0 to HW filter on device bond670 03:03:20 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x17, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:20 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x7, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1206.358056][T29719] hfs: unable to parse mount options [ 1206.451606][T29725] bond671 (uninitialized): Released all slaves 03:03:21 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x18, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x9, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:21 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0xe, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xffe0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:21 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendfile(r1, r0, 0x0, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r4, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000004c0)={r5}, 0xc) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={r5, 0x4, 0x10}, 0xc) fadvise64(r6, 0x0, 0x401, 0x3) ioctl$TIOCCONS(r2, 0x541d) r7 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xe, 0x800) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) accept$ax25(r8, 0x0, &(0x7f0000000300)) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f00000001c0)={0x3, &(0x7f0000000140)=[{0x3ff, 0x9, 0x2, 0x20}, {0x0, 0x8, 0x9, 0x2a71}, {0x6, 0x1a, 0x7f, 0x7f}]}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r11, 0x8030560a, &(0x7f0000000440)={0x20, 0x50, &(0x7f0000000380)="8ca1d94745e864f6fe9ec970c141666fcfc626138f6fb45223436ffd81958b653cbe646657982c8735f6c85780cd3828e9995f1d75d3c59421b4af782b227efc3ba6bf815fb8aa0043d124c53ebb82e69b13f6595f99cd8cabc2725f5c195b4e8057e6f11a57c6b84d881d171e1807483cd24126fd90ec0b3e9f47d267699624194f711f779c36918c0e37ed962123022094aee8ef6626baf0b8e5fc178f52f23519a1b87b4ae9e1b9b801aa6d98983f3f6a", {0x1e, 0x4, 0x6864a482, 0x1, 0x2fbf, 0x6, 0x3}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r9, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1206.916270][T29772] hfs: unable to parse mount options 03:03:21 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xa, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x19, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x1a, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xf0ffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1207.370137][T29783] 8021q: adding VLAN 0 to HW filter on device bond671 03:03:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x1b, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xe, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1207.475304][T29772] hfs: unable to parse mount options [ 1207.643999][T29800] bond672 (uninitialized): Released all slaves 03:03:22 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x8002, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x1000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:22 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r4}}, 0x20}}, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r9}}, 0x20}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4800000010000507080000000056ed5e34000000", @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r13}}, 0x20}}, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) r16 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r16, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r16, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r15, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r17, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r14, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r17}}, 0x20}}, 0x0) r18 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r18, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r19 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r19, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r20 = socket$netlink(0x10, 0x3, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r23, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r20, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r23}}, 0x20}}, 0x0) r24 = socket$netlink(0x10, 0x3, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) r26 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r26, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r26, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r25, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r27, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r24, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r27}}, 0x20}}, 0x0) r28 = socket$netlink(0x10, 0x3, 0x0) r29 = socket$netlink(0x10, 0x3, 0x0) r30 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r30, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r30, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r29, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r31, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r28, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r31}}, 0x20}}, 0x0) r32 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r32, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) r33 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f0000000540)=ANY=[@ANYRES16, @ANYRESDEC, @ANYRESDEC=r14, @ANYRES32=0x0, @ANYRESHEX, @ANYRES16=r19, @ANYRES64=r20, @ANYPTR=&(0x7f0000000480)=ANY=[@ANYRES16=r24], @ANYBLOB="c9fb720db763a8ed6ac9ab6a20386050c8fc8ec040e250a2b322cc77d4e771cc00ef70fbcc8f93f8a8325ddfb21ca50c7c23816709d70bd66f6c821c2443e5b82138f8781c3fd5b50c0e92823c46906cb238d32901af1e457832a69bef1ffa72b00e6ffe03f4475fdc7574d704a2563dc454c7dbafa990e071a91c29de49ed2704dd1a8122f4b308ec8e5e10115f7963ac1f4921bedc5def2191ddd36a6e38a4420148fc75f74d1f5edd5a8568b607ecbb11054504b89124f3cd534516200947564901aee692aaff491a7da723bf5764ccda166d9229c73fecb1cb"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x3}, 0xffffffffffffffb0, 0x10, &(0x7f0000000000), 0x10, 0x0, r32}, 0x78) r34 = socket$netlink(0x10, 0x3, 0x0) r35 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r35, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r35, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r34, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r36, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) r37 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000100)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r34, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r37, @ANYBLOB="000125bd7000ffdbdf2507000000050001000000000014000200ff010000000000000000000000000001080004007f000001db2b73e79d"], 0x38}, 0x1, 0x0, 0x0, 0x4004041}, 0xc800) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r33, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:22 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0xf, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x1c, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x11, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1207.989525][T29832] hfs: unable to parse mount options 03:03:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x1d, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x1e, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:22 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x18, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1208.342166][T29851] 8021q: adding VLAN 0 to HW filter on device bond672 03:03:22 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:22 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x21, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1208.477471][T29832] hfs: unable to parse mount options 03:03:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x22, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x23, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:23 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x29, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:23 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x10, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x3000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:23 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f00000000c0)=""/162) 03:03:23 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x950f, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) [ 1209.376171][T29900] hfs: unable to parse mount options 03:03:23 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x24, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x60, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x100, 0x0) write$P9_RSTAT(r1, &(0x7f0000000380)={0x8b, 0x7d, 0x2, {0x0, 0x84, 0x7f, 0x0, {0x40, 0x3, 0x5}, 0x10000000, 0x80000001, 0x9, 0x1, 0x8, 'erspan0\x00', 0x35, '\x13+eth0vboxnet0}keyring\xdf(bdevself\\user.securitytrusted', 0xa, 'syzkaller\x00', 0xa, 'syzkaller\x00'}}, 0x8b) fcntl$setstatus(r0, 0x4, 0x42000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f00000000c0)={'erspan0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) [ 1209.556006][T29900] 8021q: adding VLAN 0 to HW filter on device bond673 03:03:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x25, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x4000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1209.749617][T29900] hfs: unable to parse mount options 03:03:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8201, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000100)={'bridge0\x00', 0x10001}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_DEV_DESTROY(r1, 0x5502) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xe0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1209.850801][T29942] bond674 (uninitialized): Released all slaves 03:03:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x26, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xf0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x7000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:24 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x11, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1210.028581][T29952] Unknown ioctl 35106 [ 1210.231015][T29969] hfs: unable to parse mount options 03:03:24 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:24 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = accept4$inet(r2, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x40800) getsockopt$EBT_SO_GET_INIT_ENTRIES(r3, 0x0, 0x83, &(0x7f0000000380)={'filter\x00', 0x0, 0x3, 0x6, [], 0x8, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)=""/6}, &(0x7f00000001c0)=0x78) 03:03:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x27, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:24 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x300, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:24 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x9000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1210.352305][T29976] 8021q: adding VLAN 0 to HW filter on device bond674 [ 1210.455053][T29969] hfs: unable to parse mount options 03:03:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) prlimit64(r1, 0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1210.612819][T29994] bond675 (uninitialized): Released all slaves 03:03:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000100)={0x20, 0x5, 0x4, 0x40000008, 0x3ff, {}, {0x1, 0x0, 0x80, 0xd, 0x7, 0x40, "057de92f"}, 0x1d1, 0x2, @userptr=0x9b, 0x80000001, 0x0, r1}) ioctl$NS_GET_NSTYPE(r4, 0xb703, 0x0) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f00000000c0)) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r5, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x700, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x28, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x12, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xa000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x29, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1210.940995][T30019] hfs: unable to parse mount options [ 1211.057354][T30019] 8021q: adding VLAN 0 to HW filter on device bond675 [ 1211.152462][T30019] hfs: unable to parse mount options 03:03:25 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xff00, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x900, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:25 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:25 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2a, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1211.314002][T30036] bond676 (uninitialized): Released all slaves 03:03:25 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xe000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:25 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x13, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:26 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2b, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x1d}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f00000000c0)={0x1, 0x1, [0x8, 0x80000000, 0x40, 0x0, 0x0, 0x4, 0xef, 0x7fff]}) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r3, 0x4, 0x42800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='syzkaller\x00') fcntl$setstatus(r0, 0x4, 0x42000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xa00, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1211.528433][T30059] hfs: unable to parse mount options [ 1211.703409][T30059] 8021q: adding VLAN 0 to HW filter on device bond676 03:03:26 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2c, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xe00, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1211.840673][T30059] hfs: unable to parse mount options [ 1211.947556][T30087] bond677 (uninitialized): Released all slaves 03:03:26 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xff0f, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:26 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x11000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:26 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2d, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x1100, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:26 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffa, 0x1a2b}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f00000000c0)) 03:03:26 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x14, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1212.515283][T30111] hfs: unable to parse mount options 03:03:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2e, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x1528, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:27 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000300), 0x4) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000002c0)) fcntl$setstatus(r1, 0x4, 0x42000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2000, 0x0) sendmsg$NFT_MSG_GETRULE(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0xa0130}, 0xc, &(0x7f0000000140)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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"/380], 0x17c}, 0x1, 0x0, 0x0, 0x40}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1212.685442][T30111] 8021q: adding VLAN 0 to HW filter on device bond677 03:03:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x2f, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1212.818859][T30111] hfs: unable to parse mount options 03:03:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x1800, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x18000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1212.984374][T30123] bond678 (uninitialized): Released all slaves 03:03:27 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x80040, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x822, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000001c0)=[0x6, 0x3ff]) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) epoll_create1(0x80000) socket$vsock_stream(0x28, 0x1, 0x0) futimesat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, &(0x7f00000000c0)) 03:03:27 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x30, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:27 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:27 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x60, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:27 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x20000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1213.544337][T30175] hfs: unable to parse mount options 03:03:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2815, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:28 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x31, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:28 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f00000000c0)="0f9eb5ff4bc41d545df0985abe5c901f0c00980d840fafbd971cb89ecfbbb8d5b690775af38ed1b05d674a6e7f857fd942ce298c1fc2684d8d8e796be305d9c6c1") fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:28 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x32, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:28 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$kcm(0x2, 0x2, 0x73) r3 = socket$kcm(0x2, 0x2, 0x73) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1213.804335][T30175] 8021q: adding VLAN 0 to HW filter on device bond678 03:03:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x60000000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1214.049986][T30175] hfs: unable to parse mount options [ 1214.191974][T30198] bond679 (uninitialized): Released all slaves 03:03:28 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:28 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x33, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:28 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2900, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:28 executing program 3: r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f00000000c0)) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1c}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = socket$bt_rfcomm(0x1f, 0x1, 0x3) flistxattr(r3, &(0x7f0000000380)=""/193, 0xc1) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:28 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xe0ffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:28 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x300, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1214.539709][T30234] hfs: unable to parse mount options 03:03:29 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x34, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x3f00, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:29 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r3 = memfd_create(&(0x7f000003e000)='\'', 0x0) r4 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r5 = dup2(r4, r3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x80045301, &(0x7f00000001c0)) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x18100, 0x0) r7 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r8, @ANYBLOB="5700000081a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc208fd99c740002967a3a6af25b0110dd1220ccae8abc46820ecabca1e1ba165993cba605bd1"], 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r6, 0x84, 0x7b, &(0x7f00000000c0)={r8, 0x6}, 0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r5, 0x84, 0x1a, &(0x7f0000000400)={r8, 0x88, "83bcf0be4e89004b1933552a8bb2f5ff9620a973e28ff580d461da853b8dc998daa1e4e570291e422e402533815ee0acc7913ee2ce73651368ea4aaf03789c9f73eef21f05e8310403164b7aca87feb47b2c73c57aad2d6ce505140aa051d877fe06cac1fcc7b9c0956189f61a665193d9f0750d401ca541518287af4152451385a7232a9e95935f"}, &(0x7f0000000080)=0x90) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={r8, 0x3, 0x1, 0x1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1214.681134][T30234] 8021q: adding VLAN 0 to HW filter on device bond679 03:03:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xfeffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:29 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f00000000c0)="2ecb673dd32a09b84e8e6b77fc4616081b28ec6829328591cfad77826b79b483b41831da461091cfa2f1938a1ee3dc3757aaee7454d0723efe7fd71e584604c4c6ab1aa243bb3e61da8e77955c539c1e6ee9adbe4524874cdba9bd628c6452706c602e91bc82efa2da707d17c066e7e47f0f7065f3d0377ccb8ab9b4dfcf4b582c68e9f7ddf10328008a323e9043725f548840a8b33252efb4bd8dc58413cb6846254efa2a64d092dde3ae7afeb94cd6", 0xb0, r1}, 0x68) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCCONS(r2, 0x541d) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5b, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r3, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1214.830672][T30234] hfs: unable to parse mount options 03:03:29 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x4000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1214.976337][T30249] bond680 (uninitialized): Released all slaves 03:03:30 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x35, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:30 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x500, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x6000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x154, &(0x7f0000000180)="0180000000fbffffffffffffff25", 0x0, 0x7, 0x0, 0x295, 0x61, &(0x7f00000002c0)="21253bac9f70267e54f17c858041ff75fce083bd67da8cfee42e104f10a0223826cd6ce49e364c6d560d23c04c0f548c17642355e7259ae549561fa1f5a25237f9", &(0x7f0000000440)="bf7f609343c28a53add05ff4f8e8ef4dbe16b9c45e60aff140b1b41bbf570eab9c57bc7edce6c3e95c8cc09be1c49f51a9ffe8b953eea250d3fdc82997523e3c601837c541165ba31f3f380f0e63a5cfc3e0f01c4b986f14d7d143539a31c833f0"}, 0x40) r2 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x876, 0x5002) setsockopt$inet_buf(r2, 0x0, 0x9, &(0x7f0000000380)="fa63144a14ee649f1b2fe3496633a11bbe0f1db49b96c88ce670dbcbac18cef02ce70ac01f092b1cfb104283f4c07f17535f313f98770d75ab1f74cf20042b193bf5c8228e0d95b0f9f1160da35490d4c112c74d9db49af487f31813dd442959c0e7217c457ed853444946ed2a77b07401a772bfb76a3a79428f8595801cf50d087db501d6f62d4c6781ef487cfd389314bda6d43e71f8543b", 0x99) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r4, 0xc0205647, &(0x7f0000000c80)={0x4, 0x1, 0x1, r5, 0x0, &(0x7f0000000c40)={0x980920, 0x40, [], @ptr=0x200}}) bind$isdn(r8, &(0x7f0000000cc0)={0x22, 0x80, 0x7, 0x9, 0x1}, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$KDFONTOP_COPY(r9, 0x4b72, &(0x7f0000000100)={0x3, 0x0, 0xb, 0xf, 0x82, &(0x7f00000007c0)}) 03:03:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xfffff000, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1215.593258][T30295] hfs: unable to parse mount options 03:03:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x36, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xe0ff, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xffffffe0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x37, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1215.971160][T30291] syz-executor.3 (30291) used greatest stack depth: 10088 bytes left [ 1215.997285][T30305] 8021q: adding VLAN 0 to HW filter on device bond680 03:03:30 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x38, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:30 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9a9, 0xffffffffffffff80}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) socketpair(0x22, 0x800, 0xde, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x45104144}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x6, 0x1, 0x400, 0x70bd27, 0x25dfdbfe, {0x5, 0x0, 0x4}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4004000}, 0x200408c0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000380)={0x1, 0xd3, 0x10000}) [ 1216.149482][T30295] hfs: unable to parse mount options [ 1216.321544][T30313] bond681 (uninitialized): Released all slaves 03:03:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xf000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:31 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x1008010, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x39, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xfffffffe, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'bridge_slave_1\x00', 0x2000}) fcntl$setstatus(r0, 0x4, 0x42000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r2, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:31 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x600, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1216.660875][T30357] hfs: unable to parse mount options 03:03:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xffe0, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1216.837107][T30357] 8021q: adding VLAN 0 to HW filter on device bond681 03:03:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x3a, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:31 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x20000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000140)={0x0, 0xffffff9e, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01010000000000000000010000000000000009410000004c001800000200b0726f6164636173742d6c696e6b00"/98], 0x68}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x68, r3, 0x100, 0x70bd2b, 0x25dfdbfb, {{}, {}, {0x4c, 0x18, {0x8, @media='eth\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x14e0}, 0x40) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:31 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0xf0ffff, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0xffffffff, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1217.010399][T30357] hfs: unable to parse mount options [ 1217.092239][T30370] bond682 (uninitialized): Released all slaves 03:03:31 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x3b, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:31 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x700, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) [ 1217.416552][T30404] hfs: unable to parse mount options [ 1217.510660][T30404] 8021q: adding VLAN 0 to HW filter on device bond682 [ 1217.613401][T30404] hfs: unable to parse mount options 03:03:32 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x1000000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) r4 = dup(r1) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000100)='nbd\x00') r6 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x4d93551759622bb6, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_PREPARE_BUF(r8, 0xc058565d, &(0x7f0000000380)={0x3000000, 0xb, 0x4, 0x20, 0x5, {0x0, 0x2710}, {0x2, 0x5, 0x0, 0x7f, 0x7f, 0x9, '_t|G'}, 0x9, 0x3, @offset=0x6, 0xff800000, 0x0, r0}) r10 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x2000, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400020}, 0xc, &(0x7f00000007c0)={&(0x7f0000000440)={0x4c, r5, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r6}, {0x8, 0x1, r9}, {0x8, 0x1, r10}, {0x8, 0x1, r11}, {0x8, 0x1, r12}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x13}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40}, 0xffcf511be4727ded) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r13, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x3c, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1217.741140][T30422] bond683 (uninitialized): Released all slaves 03:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x3d, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x3e, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:32 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0x900, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:32 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x41, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) 03:03:32 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x54, r3, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @multicast1=0xac14140d}}, {0x14, 0x2, @in={0x2, 0x0, @dev}}}}]}]}, 0x54}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x70, r3, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x663450f4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfc0}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}]}, 0x70}}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x5d, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xffffffffffffffed, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}, 0x10}, 0x78) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000440)='/dev/bsg\x00', 0x642a00, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0x0, 0xe, 0x0, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0x0, 0x96, &(0x7f0000000300), &(0x7f0000000380)="e8737c7aecd652a0022e93d58d2f770879ea3a3dca33c28125b3382d6fb56a9be9fbe615b01f232495d5fc6fc6ca9342d8949e9f73000d7b4ab10b13f8b3c7322ae9b66336b9a4519f764e5c81e3608e815405d85109f616740afa018b5d776d8d812b6ff25844cefdff58fc5d3489814387e812294c30ae57278807e7628f55a69746a4010e646006f4340daf501c4a9d293b9e4d93"}, 0x40) 03:03:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x2000000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) [ 1218.284669][T30455] vcan0: MTU too low for tipc bearer [ 1218.308805][T30455] tipc: Enabling of bearer rejected, failed to enable media [ 1218.373536][T30464] hfs: unable to parse mount options [ 1218.478621][T30470] 8021q: adding VLAN 0 to HW filter on device bond683 [ 1218.566183][T30464] hfs: unable to parse mount options 03:03:33 executing program 5: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x2800000, 0x0, 0x0, &(0x7f0000000000)={[{@codepage={'codepage', 0x3d, 'iso8859-5'}}]}) 03:03:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x42, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = socket$inet6(0xa, 0x4, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r9, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r9}}, 0x20}}, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r13, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="00004de800000000"], 0x48}}, 0x0) sendmsg$nl_route(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=@newlink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x2000, r13}}, 0x20}}, 0x0) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)=ANY=[@ANYBLOB="4800000010000507000000", @ANYRESHEX=r10, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=r5, @ANYBLOB="00004de800000000"], 0x5}, 0x1, 0x0, 0x0, 0x6202b01a96ce72de}, 0x0) r14 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000001c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r3, &(0x7f00000003c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x6c, r14, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast1}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @loopback}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_DOMAIN={0x5, 0x1, '\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x8000}, 0x811) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e21, 0x0, @remote, 0x1}, {0xa, 0x4e21, 0x4800000, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, 0x7fff, [0x8, 0x80, 0x40, 0x7, 0x40, 0x1, 0x7ff, 0x80000000]}, 0x5c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0xf0, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x3000000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x3, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1218.683778][T30480] bond684 (uninitialized): Released all slaves 03:03:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x43, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:33 executing program 2: syz_mount_image$hfs(&(0x7f0000000400)='hfs\x00', &(0x7f0000000440)='./file1\x00', 0x1, 0x0, 0x0, 0x400, &(0x7f0000000140)=ANY=[@ANYBLOB="63ef0000af7d578c97cadc0df3b6a4a8e2b1176f1984cd24828a8aa33d72cd9cb771f60ccf50fa3210893445f3bec1f0ff0f0000d6787486d26a3a660ceb64f69ac7a9268362cf4af17fea29cd7f7106c80aceb68bcb8441e35054aa7c65c9ae5058287e1d3086e138f72fd3e75ad8160cde8c96ad0d7f16e481f0be5ffb2ce7834a38ff6a713569f94c3ed329fc37b5952f974ad5dc14dcb2e4d06efae9ca"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x20c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xfffffbffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x5, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x202080, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xe, 0x4, 0x4, 0x1}, 0x1e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r2, &(0x7f0000000000), 0x0}, 0x20) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x80, 0x0) getsockopt$EBT_SO_GET_INFO(r4, 0x0, 0x80, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x2a8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x5c199d66c5c083e6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) r6 = dup(r3) setsockopt$inet6_udp_encap(r6, 0x11, 0x64, &(0x7f00000002c0)=0x1, 0x4) r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r4, 0x28, 0x2, &(0x7f0000000740)=0x7, 0x8) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0xffffffffffffffff, 0x0, &(0x7f0000000640)=""/216) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) r10 = socket(0x2000000000000010, 0x3, 0x0) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000240)={0x0, 0x7e, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r11, 0x503}, 0x14}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x1c, r11, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r12, 0x40203}, [@IFLA_LINKINFO={0x14, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000580)=@newlink={0x54, 0x10, 0xe3b, 0x0, 0xa00, {}, [@IFLA_MASTER={0x8, 0xa, r12}, @IFLA_LINKINFO={0x2c, 0x12, @ip6ip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x1c, 0x2, [@tunl6_policy=[@IFLA_IPTUN_LOCAL={0x14, 0x2, @mcast2}], @tunl6_policy=[@tunl_policy=[@IFLA_IPTUN_COLLECT_METADATA={0x4}]]]}}}]}, 0x54}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:03:33 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0x0, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501430500de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x4000000, 0xe0, 0x0, &(0x7f0000000080)="f4"}, 0x40) 03:03:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0x1f, 0xfffffffffffffeea, &(0x7f00000006c0)="b9ff03000007698cb89e40f088a8d501080600de0500000077fb7f11c72be9", 0x0, 0x100, 0x0, 0x4, 0x0, &(0x7f0000000000), &(0x7f0000000080)="f420cce8f86ce5e2"}, 0x28) [ 1219.008833][T30504] hfs: unable to parse mount options 03:03:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x44, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) 03:03:33 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="b702000004000080bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff6d6405000000000065040400010002000404000001000000b7050000000000006a0a80fe000000008500000053000000b70000000000000095000010000000004e6201363034fdb117168bd07ba08af339d1a1ee35fe2a3a255c33282044b124cf174a4cd88dbe02be953c0a9fa9a84452569957c1002ed7d4d8e17f791e4798c8eb484de03352c69b3edff5be26765ba5f8f2879021c2ea53ea79acd7fb38fdf79f2be9087a3e7b7c4ae7dd5e4dee8851d40c617bd8c8108ddf12dddd4bfc2a4dd35383561cbe0458f1f5b6beba510b4229b0d4b504516c4c3e5d1aa044d8d00728141cd67bcd68f253288e655c6b34e02e90637ef2912ba7de13ff2357ef17f95a25780c3a0578442926ef4e912f01a201e694e3806e8c8fe8b69524cd19f7525d8d66bb766f7f3f918c86a702522368d9f81897133af94a5a4cfc794d8b9d7c33632152c58eaf302f0b2e0c252bb66762dbfa4177a5ee917bca4885819fb498d1ddb5f06272d88e0c8088f404f011289ebc5623ea21182632161e073af1d69a2e3bbe115be3b325ecd201d2ffb0a7fa4f5d11060cdcf071defde1ffffffffffffff61aca75827426dde87fdf4617222a08471b8aa1315e9324d308266c9151996427816b8513c5201048bbb61afbcbc4bff6d42a9a144e3e58e3acf83c18572d9e1244287a0f9d8243acef1cece0713549298945bc3628953e57d0973b8fc884ad5711a3e71371c6ad2f8d42d8aa0373af36753cef357e67bc2e675d792963411265086fdb2b896bee3321993d1eee2d7665b60d5c7f20ef1998571c74bcbeebf87c69c68da64731c4b1fd12d98dc017a7cd9258991590943061a3c2f6467c40db6d75d6ef127b7518eb006f217ff0519fec56708c5e569ed544f90c5ea0449af6ed2d55ea131e51d0c874bf1fbbb7c828e266b27355e8473be33b7713558aa5850b8a5d3f765dd6f48f601"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r1, 0x0, 0xe, 0x1e9, &(0x7f0000000180)="c45c57ce395de5b2810f7d637a22", 0x0, 0x45, 0x0, 0xffad, 0x0, &(0x7f0000000040)}, 0x28) [ 1219.370970][T30520] 8021q: adding VLAN 0 to HW filter on device bond684 [ 1219.430602][ C0] ================================================================== [ 1219.438714][ C0] BUG: KCSAN: data-race in __perf_event_overflow / fasync_remove_entry [ 1219.446960][ C0] [ 1219.449283][ C0] write to 0xffff88807d1cc300 of 8 bytes by task 30485 on cpu 1: [ 1219.456989][ C0] fasync_remove_entry+0xba/0x120 [ 1219.461998][ C0] fasync_helper+0xcf/0xdc [ 1219.466393][ C0] perf_fasync+0x6c/0xa0 [ 1219.470611][ C0] __fput+0x46a/0x520 [ 1219.474570][ C0] ____fput+0x1f/0x30 [ 1219.478534][ C0] task_work_run+0xf6/0x130 [ 1219.483029][ C0] exit_to_usermode_loop+0x2b4/0x2c0 [ 1219.488305][ C0] do_syscall_64+0x384/0x3a0 [ 1219.492885][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1219.498754][ C0] [ 1219.501068][ C0] read to 0xffff88807d1cc300 of 8 bytes by interrupt on cpu 0: [ 1219.508593][ C0] __perf_event_overflow+0x11d/0x200 [ 1219.513863][ C0] perf_swevent_hrtimer+0x261/0x280 [ 1219.519068][ C0] __hrtimer_run_queues+0x274/0x5f0 [ 1219.524247][ C0] hrtimer_interrupt+0x22a/0x480 [ 1219.529167][ C0] smp_apic_timer_interrupt+0xdc/0x280 [ 1219.534637][ C0] apic_timer_interrupt+0xf/0x20 [ 1219.539568][ C0] __sanitizer_cov_trace_pc+0x14/0x50 [ 1219.544923][ C0] skb_network_protocol+0xa4/0x2a0 [ 1219.550015][ C0] netif_skb_features+0x20f/0x6b0 [ 1219.555027][ C0] validate_xmit_skb+0x49/0x870 [ 1219.559863][ C0] __dev_queue_xmit+0xbce/0x1ba0 [ 1219.564782][ C0] dev_queue_xmit+0x21/0x30 [ 1219.569268][ C0] netlink_deliver_tap+0x3d5/0x4a0 [ 1219.574362][ C0] netlink_unicast+0x43a/0x4d0 [ 1219.579109][ C0] netlink_sendmsg+0x4d3/0x8b0 [ 1219.583869][ C0] sock_sendmsg+0x9f/0xc0 [ 1219.588201][ C0] ____sys_sendmsg+0x49d/0x4d0 [ 1219.592960][ C0] ___sys_sendmsg+0xb5/0x100 [ 1219.597538][ C0] __sys_sendmsg+0xa0/0x160 [ 1219.602031][ C0] __x64_sys_sendmsg+0x51/0x70 [ 1219.606786][ C0] do_syscall_64+0xcc/0x3a0 [ 1219.611271][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1219.617134][ C0] [ 1219.619448][ C0] Reported by Kernel Concurrency Sanitizer on: [ 1219.625585][ C0] CPU: 0 PID: 30491 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1219.634241][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.644274][ C0] ================================================================== [ 1219.652327][ C0] Kernel panic - not syncing: panic_on_warn set ... [ 1219.658954][ C0] CPU: 0 PID: 30491 Comm: syz-executor.3 Not tainted 5.5.0-rc1-syzkaller #0 [ 1219.667608][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1219.677647][ C0] Call Trace: [ 1219.680916][ C0] [ 1219.683765][ C0] dump_stack+0x11d/0x181 [ 1219.688089][ C0] panic+0x210/0x640 [ 1219.691978][ C0] ? vprintk_func+0x8d/0x140 [ 1219.696559][ C0] kcsan_report.cold+0xc/0xd [ 1219.701146][ C0] kcsan_setup_watchpoint+0x3fe/0x460 [ 1219.706505][ C0] __tsan_read8+0xc6/0x100 [ 1219.710904][ C0] __perf_event_overflow+0x11d/0x200 [ 1219.716171][ C0] ? perf_prepare_sample+0xec0/0xec0 [ 1219.721446][ C0] perf_swevent_hrtimer+0x261/0x280 [ 1219.726636][ C0] ? update_curr+0x109/0x1d0 [ 1219.731249][ C0] ? check_preempt_wakeup+0xf9/0x1c0 [ 1219.736527][ C0] ? rb_erase+0x1f4/0x9a0 [ 1219.740844][ C0] ? __read_once_size.constprop.0+0x12/0x20 [ 1219.746723][ C0] ? timerqueue_del+0xa1/0x100 [ 1219.751484][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1219.757817][ C0] ? __remove_hrtimer+0x9a/0x170 [ 1219.762781][ C0] __hrtimer_run_queues+0x274/0x5f0 [ 1219.767966][ C0] ? __perf_event_overflow+0x200/0x200 [ 1219.773425][ C0] hrtimer_interrupt+0x22a/0x480 [ 1219.778346][ C0] ? sched_clock+0x13/0x20 [ 1219.782750][ C0] smp_apic_timer_interrupt+0xdc/0x280 [ 1219.788193][ C0] apic_timer_interrupt+0xf/0x20 [ 1219.793109][ C0] [ 1219.796033][ C0] RIP: 0010:__sanitizer_cov_trace_pc+0x14/0x50 [ 1219.802180][ C0] Code: 8b 80 48 0a 00 00 c3 0f 1f 44 00 00 66 2e 0f 1f 84 00 00 00 00 00 55 48 89 e5 65 48 8b 04 25 40 8c 01 00 65 8b 15 a4 85 bc 7e <81> e2 00 01 1f 00 48 8b 75 08 75 2b 8b 90 30 0a 00 00 83 fa 02 75 [ 1219.821762][ C0] RSP: 0018:ffffc9000354b878 EFLAGS: 00000206 ORIG_RAX: ffffffffffffff13 [ 1219.830158][ C0] RAX: ffff888086831000 RBX: ffff888089836000 RCX: ffffffff86252530 [ 1219.838113][ C0] RDX: 0000000080000200 RSI: 0000ffffffffffff RDI: ffffc9000354b904 [ 1219.846066][ C0] RBP: ffffc9000354b878 R08: 0000000000000000 R09: 0000888089836078 [ 1219.854119][ C0] R10: 0000c9000354b904 R11: 0000c9000354b907 R12: 0000000000000000 [ 1219.862076][ C0] R13: 0000000000000000 R14: ffffc9000354b904 R15: 0000000000000000 [ 1219.870050][ C0] skb_network_protocol+0xa4/0x2a0 [ 1219.875156][ C0] netif_skb_features+0x20f/0x6b0 [ 1219.880175][ C0] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 1219.886061][ C0] validate_xmit_skb+0x49/0x870 [ 1219.890924][ C0] __dev_queue_xmit+0xbce/0x1ba0 [ 1219.895854][ C0] ? __write_once_size+0x5a/0xe0 [ 1219.900811][ C0] dev_queue_xmit+0x21/0x30 [ 1219.905299][ C0] netlink_deliver_tap+0x3d5/0x4a0 [ 1219.910417][ C0] netlink_unicast+0x43a/0x4d0 [ 1219.915175][ C0] netlink_sendmsg+0x4d3/0x8b0 [ 1219.920038][ C0] ? netlink_unicast+0x4d0/0x4d0 [ 1219.924963][ C0] sock_sendmsg+0x9f/0xc0 [ 1219.929284][ C0] ____sys_sendmsg+0x49d/0x4d0 [ 1219.934045][ C0] ___sys_sendmsg+0xb5/0x100 [ 1219.938631][ C0] ? __fget+0xb8/0x1d0 [ 1219.942695][ C0] ? __fget_light+0xaf/0x190 [ 1219.947284][ C0] ? __fdget+0x2c/0x40 [ 1219.951376][ C0] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1219.957621][ C0] __sys_sendmsg+0xa0/0x160 [ 1219.962125][ C0] __x64_sys_sendmsg+0x51/0x70 [ 1219.966886][ C0] do_syscall_64+0xcc/0x3a0 [ 1219.971386][ C0] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1219.977263][ C0] RIP: 0033:0x45af49 [ 1219.981154][ C0] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1220.000744][ C0] RSP: 002b:00007ff811c5fc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1220.009144][ C0] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045af49 [ 1220.017103][ C0] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 000000000000000c [ 1220.025060][ C0] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1220.033020][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff811c606d4 [ 1220.040983][ C0] R13: 00000000004cab9a R14: 00000000004e4320 R15: 00000000ffffffff [ 1220.050168][ C0] Kernel Offset: disabled [ 1220.054499][ C0] Rebooting in 86400 seconds..